“…Similarly, CA generates PK w = {PK w1 , PK w2 }, δ w , and for each user u ∈ U writer . The CA sends PK w and δ w to the cloud server and u ∈ U writer receives from the CA. EncryptCK (PK r , PK w , CK r , , CK w , Γ) , , : Using Γ and PK r , the data owner encrypts CK r , and generates , , respectively, using Nishat's scheme . Similarly, the data owner encrypts CK w and generates .…”