5 the method we suggest ensures that after authorization is revoked a cheating user alice will not be able to access the data even if many access servers still consider her authorized and even if the complete raw database is available to her