Thank you for the informative video. Regarding: "Application" slide starting at 13:26, there is one thing I don't understand. In the CP-ABE the policy is defined in Ciphertext itself. In your example the policy gets added on Blockchain. Firstly, isn't the ciphertext in blockchain containing the Bob's data already? Isn't the 'Bomb's encrypted data' somewhere in the cloud redundant? Secondly, once data gets added in the blockchain it stays on the blockchain including all its history. Does it mean that even if Bob decides to remove access for Alice, she could still access the data she previously had access to, as she could decrypt the data from the historical ciphertext policy.
@ViCypriots Жыл бұрын
Hey sir great explanation but with all the respect, the code example included is really abstract and makes it really hard to understand the actually maths behind this scheme.
@BillBuchanan Жыл бұрын
Then don't look at the code, and just read the research papers. The background theory is here: asecuritysite.com/pairing
@ViCypriots Жыл бұрын
@@BillBuchanan I really appreciate the reply, and thank you for the pointer!. Have a great day mister Buchanan you are doing gods work.