Skip to main content
. 2020 Jan 31;26(1):3–12. doi: 10.4258/hir.2020.26.1.3

Figure 2. Proxy re-encryption scheme.

Figure 2