The growing popularity and application of Web services have led to increased attention regarding the vulnerability of software based on these services.Vulnerabi
In the previous construction of attributed-based encryption for circuits on lattices,the secret key size was exponential to the number of AND gates of the circu