Example: bankruptcy

Search results with tag "Ciphertext"

Ciphertext-Policy Attribute-Based Encryption

Ciphertext-Policy Attribute-Based Encryption

www.cs.utexas.edu

tonic “access tree”, where nodes of the access struc-ture are composed of threshold gates and the leaves describe attributes. We note that AND gates can be constructed as n-of-nthreshold gates and OR gates as 1-of-nthreshold gates. Furthermore, we can handle more complex access controls such as numeric ranges

  Policy, Based, True, Encryption, Attribute, Crust, Struc tures, Ciphertext policy attribute based encryption, Ciphertext

Similar queries