ABSTRACT
The RPP-ABE designed in this chapter is improved based on the previous schemes which are briefly introduced and analyzed as follows.
2.1 Waters’ scheme
Waters designs an ecient identity-based encryption scheme which can eectively ensure users’ access
control to files in the literature [1], but it may lead to the leakage of legitimate users’ identity information.