Fig. 4From: An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use caseDecryption algorithm in our schemeBack to article page