Example: bankruptcy
Search results with tag "Ciphertext"
Ciphertext-Policy Attribute-Based Encryption
www.cs.utexas.edutonic “access tree”, where nodes of the access struc-ture are composed of threshold gates and the leaves describe attributes. We note that AND gates can be constructed as n-of-nthreshold gates and OR gates as 1-of-nthreshold gates. Furthermore, we can handle more complex access controls such as numeric ranges