“…Then the user selects his public and secret signing keys
and produces
to interact with GM via
Join‐Issue user‐join protocol. The process and the construction of the protocol follow the same process and construction given by previous GS schemes
2,16–18 . Compared to the existing schemes, the user encrypts his id, first, with the selected attribute set (
) and then with GM's public (encryption) key (
).…”