From: Comprehensive evaluation of key management hierarchies for outsourced data
Size of initial hierarchy (M)
Grant operation
Revoke operation
Average file re-encryptions
100
0.477ms
13.2ms
3
300
0.454ms
38.0ms
7
500
0.440ms
78.8ms
11