Skip to main content

Table 2 Secret keys with each user

From: Comprehensive evaluation of key management hierarchies for outsourced data

User

Secret keys

A

KACD,KAB

B

KAB,KBC

C

KACD,KBC

D

KACD,KABD