Fig. 1From: Predicate encryption against master-key tampering attacksProof profileBack to article page