Skip to main content

Advertisement

Table 2 Secret keys with each user

From: Comprehensive evaluation of key management hierarchies for outsourced data

User Secret keys
A KACD,KAB
B KAB,KBC
C KACD,KBC
D KACD,KABD