Fig. 5From: Access control scheme based on blockchain and attribute-based searchable encryption in cloud environmentTime consumption of KeyGenBack to article page