How to decide whether attribute-based encryption is the right choice for you?
1. Analyze the challenges to be solved in the area of providing access to sensitive information, determining the suitability of an attribute-based encryption access control model, including when the data is stored in an untrusted cloud;
2. Select and implement cryptographic algorithms optimal for solving the challenges defined in Step 1, taking the
quantum threat into account;
3. Design, pilot and implement attribute-based encryption solutions together with the QApp team.