Research Article
Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
Figure 5
Comparison of the efficiency of the scheme in this article and Sethi’s scheme (2020). (a) Comparison of key generation efficiency. (b) Comparison of encryption efficiency. (c) Comparison of decryption efficiency.
(a) |
(b) |
(c) |