Research Article

Revisiting the Practicality of Search on Encrypted Data: From the Security Broker’s Perspective

Figure 2

The procedure of sending mails to QQMail.