Fig. 1From: Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart cityFog nodes in smart cityBack to article page