Fig. 2From: An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishabilityRunning Time of PEKS AlgorithmBack to article page