Research Article
Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks
Figure 3
Time costs of different algorithms.
| (a) Setup time |
| (b) Key generation time |
| (c) Encryption time |
| (d) Token generation time |
| (e) Decryption and partial decryption time |
| (f) Trace time with different number of users |