Fig. 2From: Efficient functional encryption for inner product with simulation-based securityFramework of Security ProofBack to article page