Abstract: Highlights•We make attribute authorities independent with each other.•We give a new Zero Knowledge proof protocol to make our scheme verifiable.•We give two external schemes to decentralize the audit power in basic scheme.•The access policy is designed based on linear secret sharing scheme, which is flexible.
External IDs:dblp:journals/csi/WangZL25
Loading