Research Article

Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage

Figure 5

Performance comparison of the encryption time. (a) Encryption time under a different number of attributes. (b) Encryption time in different speech data size.
(a)
(b)