Attribute-based encryption: Difference between revisions

Content deleted Content added
Add section starting discuss relationship to Role-based encryption. More references needed.
Clarify one-way relationship with role-based encryption
Line 13:
== Relationship to Role-based Encryption ==
 
The related concept of [[Role-based encryption|role-based encryption]]<ref name="SuryakantBhise R.N pp. 15–20">{{cite journal | last=SuryakantBhise | first=Avdhut | last2=R.N | first2=Phursule | title=A Review of Role based Encryption System for Secure Cloud Storage | journal=International Journal of Computer Applications | publisher=Foundation of Computer Science | volume=109 | issue=14 | date=2015-01-16 | issn=0975-8887 | doi=10.5120/19255-0986 | pages=15–20}}</ref> refers exclusively to access keys having roles that can be validated against an authoritative store of roles. In this sense, Role-based encryption can be expressed by Attribute-based encryption and within that limited context the two terms can be used interchangeably. Role-based Encryption cannot express Attribute-based encryption.
 
==Usage==