Fig. 1. Creation of Secret Key
The figure number 02 illustrates the process of encryption and decryption. The encryption is done at the sender end using the attributed received from the receiver. From the example below, the attributes with which the data is encrypted is based on the mathematical combination operations such AND and OR. The identities used for encryption are Mathematics department and that the person is either into PhD or MSc degree within the mathematics Department. Once the data is encrypted using the combination of attributes, the cipher will be send to the user (receiver).