Research Article
[Retracted] Hybrid Encryption Algorithm for Sensitive Information of College Physical Fitness in Cloud Storage Environment
Table 2
Sharing performance parameters of different sensitive information encryption methods.
| Sharing scheme | Test group a | Test group b | Test group c | Test group d |
| Attribute hiding | √ | — | — | — | Property undo | √ | — | — | √ | User revocation | √ | √ | √ | √ | Computing outsourcing | √ | — | — | √ | Fine grained access | √ | √ | √ | √ | Sharing mode | Many to many | One to many | One to many | One to many |
|
|