Fig. 3From: Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart citySecret access policy. The information of attribute and name and its value in the dotted node is fully hiddenBack to article page