Research Article

Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length

Figure 4

Outsourcing decryption time.