Research Article

Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage

Figure 1

General hierarchical access structure.