Research Article
Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks
Table 1
Notations used in the paper.
| Notations | Description |
| | The th attribute, | | The value of the th attribute | | The attribute set of user | | The th attribute value of | | The access policy | | The th attribute value of | | The hidden attribute set | | The hidden access policy |
|
|