Research Article

Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks

Figure 3

Computation overhead. (a) Key Generation time. (b) Encryption time. (c) Trapdoor Generation time. (d) Transform time. (e) Decryption time.
(a)
(b)
(c)
(d)
(e)