Fig. 6From: Access control scheme based on blockchain and attribute-based searchable encryption in cloud environmentTime consumption of TokenBack to article page