Fig. 10From: Multi-security-level cloud storage system based on improved proxy re-encryptionPerformance of re-encryptionBack to article page