ABSTRACT

The RPP-ABE designed in this chapter is improved based on the previous schemes which are briefly introduced and analyzed as follows.

2.1 Waters’ scheme

Waters designs an ecient identity-based encryption scheme which can eectively ensure users’ access

control to files in the literature [1], but it may lead to the leakage of legitimate users’ identity information.