Research Article
[Retracted] Cloud Computing Storage Data Access Control Method Based on Dynamic Re-Encryption
Figure 7
Comparison of energy consumption in different stages. (a) User private key generation stage. (b) Data encryption stage. (c) Data decryption stage. (d) Revocation stage.
| (a) |
| (b) |
| (c) |
| (d) |