Supported by the National Natural Science Foundation of China(60903175,60703048);the Natural Science Foundation of Hubei Province(2009CBD307,2008CDB352)
According to the relation of an attribute set and its subset,the author presents a hierarchical attribute-based encryption scheme in which a secret key is associated with an attribute set.A user can delegate the priva...
Supported by the National Natural Science Foundation of China(60903175,60703048);the Natural Science Foundation of Hubei Province (2009CBD307,2008CDB352)
The decryption participant's private key share for decryption is delegated by key generation center in the threshold IBE scheme.However,a key generation center which is absolutely trustworthy does not exist.So the au...