Research Article
Data Protection of Accounting Information Based on Big Data and Cloud Computing
Table 1
Performance comparison of the two schemes.
| Steps | Single authority ABE (s) | Multiauthority ABE (s) |
| Initialization | 3.8 | 1.7 | Key generation | 2.7 | 1.3 | Encryption | 3.2 | 1.0 | Decrypt | 3.5 | 1.5 | Key update | 3.6 | 0.9 | Ciphertext update | 4.0 | 1.1 |
|
|