Fig. 3From: Predicate encryption against master-key tampering attacks\(\mathbb {Z}_{N}\) where N is composite. a The time of generating PP b The time of evaluationBack to article page