Fig. 5From: Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart cityAccess tree with hidden attributes. The information of attribute name and its value in the dotted node is fully hidden, only the index of the node is revealedBack to article page