Project

General

Profile

Actions

NAC-ABE Design

Why KP-ABE

Data encryption → CK encryption → CK decryption

ABE encryption of CK (black box)

ABE key issuance (DKEY)

CK granularity (second/minute/hour)

Tradeoffs of CK reuse level


Updated by Suravi Regmi about 16 hours ago · 2 revisions