Fig. 4From: Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart cityNormal access treeBack to article page