ݺߣ

ݺߣShare a Scribd company logo
Rebuttal to “Comments on ‘Control Cloud Data Access Privilege and
Anonymity With Fully Anonymous Attribute-Based Encryption”’
Abstract:
Ma et al. recently submitted a comment correspondence which points out a flaw
in our paper (a sequel of our earlier paper published in the Proceedings of IEEE
INFOCOM). The flaw led to the leakage of the system-wide master key; therefore,
we improved our own scheme by addressing it.

More Related Content

Rebuttal to “comments on ‘control cloud data access privilege and anonymity with fully anonymous attribute based encryption”’

  • 1. Rebuttal to “Comments on ‘Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption”’ Abstract: Ma et al. recently submitted a comment correspondence which points out a flaw in our paper (a sequel of our earlier paper published in the Proceedings of IEEE INFOCOM). The flaw led to the leakage of the system-wide master key; therefore, we improved our own scheme by addressing it.