Fig. 2From: Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart cityPublic access policyBack to article page