Research Article

A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods

Figure 3

Data structure and search process for asymmetric setting.
153791.fig.003