Skip to main content
. 2020 Feb 17;6:e259. doi: 10.7717/peerj-cs.259
Input: Plain Text file
Output: Encrypted file 
Step 01: Generate Private Key 
Step 01.a: Set of attributes is specified that describe the key.
Step 01.b: Output private key ‘q’
Step 02: Encryption:(The algorithm encrypts File ‘F’ with policy ‘P’ and outputs the cipher-text)
Step 02.a: Selects the file to be encrypted and set of attributes.
Step 02.b: Encrypt a file F using a set of attributes occurring in the policy ‘P’
Step 03.c: Generate cipher-text CT
Step03: Encrypted file (in step-02) is protected again by the password
Step 04: Generate honey words and present it to user.
Step 05: Decryption: (Decryption algorithm gets as input an encrypted file which is protected by the password. Cipher-text CT is produced by the encrypted algorithm, an access policy ‘P’ under which CT was encrypted.)
Step 05.a: Input is encrypted file
Step 05.b: Enter the password; if password matches, the cipher text CT is decrypted, otherwise intruder is detected.
Step 05.c: User applies y number of attributes to compute private key
Step 05.d: If key matches, file is decrypted and output the corresponding original file ‘F’, otherwise it outputs NULL.