|
Algorithm 5 DecryptNode. |
| Input: |
| : defined in Equation (3) |
| : the querier ’s secret key; |
| : the querier ’s attribute set; |
| u: a node in the access tree ; |
| Output: |
| : a secret parameter; |
| or ⊥ |
| 1: if
u is a leaf node then
|
| 2: Set ; |
| 3: if
then
|
| 4: Compute
|
| 5: else
return
; |
| 6: end if
|
| 7: else
|
| 8: Define ; |
| 9: for all
do
|
| 10: Compute ; |
| 11: if
then
|
| 12: Update ; |
| 13: end if
|
| 14: end for
|
| 15: if
then
return
; |
| 16: else
|
| 17: Compute using by polynomial interpolation method; |
| 18: end if
|
| 19: end if
|
| return
. |