Research Article
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
Figure 5
Performance comparison of the encryption time. (a) Encryption time under a different number of attributes. (b) Encryption time in different speech data size.
(a) |
(b) |