Research Article

Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption

Figure 2

Encryption phase's sequence diagram.