Fig. 2From: An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use caseDecryption algorithm in LT schemeBack to article page