Download now Free registration required
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob is the user at the upper level and all the employees in the company are the users at the lower level. This paper designs and constructs a scheme, which enables the user at the upper level to efficiently share the secure cloud storage services with all the users at the lower level. A sender can specify several users at the lower level as the recipients for a file by taking the number and public keys of the recipients as inputs of a hierarchical identity based encryption algorithm.
- Format: PDF
- Size: 227.1 KB