Research Article

Data Protection of Accounting Information Based on Big Data and Cloud Computing

Table 1

Performance comparison of the two schemes.

StepsSingle authority ABE (s)Multiauthority ABE (s)

Initialization3.81.7
Key generation2.71.3
Encryption3.21.0
Decrypt3.51.5
Key update3.60.9
Ciphertext update4.01.1