Research Article

Re-Encryption Method Designed by Row Complete Matrix

Figure 5

The flowchart of re-encryption.
402890.fig.005