Figure 1From: Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating Flow of the proposed scheme. Back to article page