Skip to main content
. Author manuscript; available in PMC: 2017 Sep 14.
Published in final edited form as: IEEE Trans Dependable Secure Comput. 2015 Oct 1;14(5):463–477. doi: 10.1109/TDSC.2015.2484326

Fig. 6.

Fig. 6

The average runtimes of a protocol for different encryption key sizes k (n = 32) and different number of participants n (k = 128).