Input: |
Plain Text file |
Output: |
Encrypted file |
Step 01: |
Generate Private Key |
Step 01.a: |
Set of attributes is specified that describe the key. |
Step 01.b: |
Output private key ‘q’ |
Step 02: |
Encryption:(The algorithm encrypts File ‘F’ with policy ‘P’ and outputs the cipher-text) |
Step 02.a: |
Selects the file to be encrypted and set of attributes. |
Step 02.b: |
Encrypt a file F using a set of attributes occurring in the policy ‘P’ |
Step 03.c: |
Generate cipher-text CT |
Step03: |
Encrypted file (in step-02) is protected again by the password |
Step 04: |
Generate honey words and present it to user. |
Step 05: |
Decryption: (Decryption algorithm gets as input an encrypted file which is protected by the password. Cipher-text CT is produced by the encrypted algorithm, an access policy ‘P’ under which CT was encrypted.) |
Step 05.a: |
Input is encrypted file |
Step 05.b: |
Enter the password; if password matches, the cipher text CT is decrypted, otherwise intruder is detected. |
Step 05.c: |
User applies y number of attributes to compute private key |
Step 05.d: |
If key matches, file is decrypted and output the corresponding original file ‘F’, otherwise it outputs NULL. |