Research Article

Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health

Figure 1

Flow of role-based proxy decryption level II.