Figures & data
Table 1. Comparison of security properties.
Table 2. Proposed protocol communication overhead.
Table 3. Communication overhead of ,
and
ciphertexts.
Table 4. Experimental parameters.
Figure 6. Computational cost comparison. (a) CC computation (b) patients computation (c) delegators computation and(d) delegatees computation.
![Figure 6. Computational cost comparison. (a) CC computation (b) patients computation (c) delegators computation and(d) delegatees computation.](/cms/asset/f2999c36-319c-443c-bf68-79366ca0981f/ccos_a_2367549_f0006_oc.jpg)