The document discusses attribute-based encryption (ABE) techniques for access control of encrypted data. It describes ciphertext-policy attribute-based encryption (CP-ABE) which allows a user to decrypt a ciphertext if they possess a set of attributes that satisfy the ciphertext's access policy. The CP-ABE scheme involves four algorithms: Setup generates public and master keys, Encrypt generates a ciphertext based on an access policy and attributes, KeyGeneration generates a private key for a set of attributes, and Decrypt decrypts a ciphertext if a user's attributes satisfy the access policy.