Fig. 8From: Access control scheme based on blockchain and attribute-based searchable encryption in cloud environmentTime consumption of DecryptBack to article page