Research Article
Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
Figure 4
Comparison of different parameters and running time of each algorithm. (a) Comparison of the number of attributes and time. (b) Comparison of the number of attributes and time in the access policy. (c) Comparison of the number of access structure hierarchies and time. (d) Comparison of the size of encrypted speech and time.
(a) |
(b) |
(c) |
(d) |