Skip to main content
. 2022 Apr 14;17(4):e0266916. doi: 10.1371/journal.pone.0266916

Fig 1. Illustration of a simple searchable encryption.

Fig 1