The session has two talks on attribute and identity based encryption schemes. They are public key encryption schemes that allow the control of the decryption capability, based on the receiver's…