Fig. 9From: Access control scheme based on blockchain and attribute-based searchable encryption in cloud environmentTime consumption of RevocationBack to article page