Fig. 1From: An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computingAccess structure for KP-ABEBack to article page