Research Article

Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage

Figure 5

Comparison of the efficiency of the scheme in this article and Sethi’s scheme (2020). (a) Comparison of key generation efficiency. (b) Comparison of encryption efficiency. (c) Comparison of decryption efficiency.
(a)
(b)
(c)