Research Article

Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health

Figure 2

Performance analysis of decryption time Level-II.