Research Article

Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs

Figure 3

Computational overhead comparison.