Fig. 6From: An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use caseStructure of uploaded dataBack to article page