Fig. 2From: An efficient traceable access control scheme with reliable key delegation in mobile cloud computingKey generationBack to article page