Table 1.
Comparisons of Our Scheme with the Main References.
Fig 1.
System model of the proposed scheme.
Table 2.
File Storage Format in CS.
Fig 2.
Flowchart of Our Proposed Scheme.
Fig 3.
Flowchart of attack model 2.
Table 3.
Comparisons of Computational Complexity.
Fig 4.
The performance of CP-ABE.