Abstract: In end-to-end data sharing, data are directly distributed to data receivers and stored on their terminals, making it hard to ensure forward security because receivers whose permissions have ...