Fig. 6From: An efficient attribute-based hierarchical data access control scheme in cloud computingEncryption and decryption time when the attribute number increasesBack to article page