“…3.1, I encrypts piece ′ j and sends a 3-tuple of data, (X 1 , X 2 , X 3 ), to a user, A. After a user, B, gets all of the encrypted pieces, B obtains a set of the decryption keys, K B , and the decryption key in the scheme of [14] from the KM server. By the decryption with K B , B gets piece ′ 1 , .…”