Research Article
Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN)
Table 2
Notations of the proposed scheme.
| S.no | Notation | Description |
| 1 | HEC | Hyper elliptic curve from the finite field Fn having order n | 2 | n | It is a large prime number, and the order is n ≤ 280 | 3 | ψ | Public parameter set | 4 | ϒ | Symbolizes the input security parameter from the hyperelliptic curve | 5 | δ | Master secret key of KGC | 6 | ℒ | Master public key of KGC | 7 | ℎ | Irreversible or one-way hash function | 8 | | Divisor on HEC | 9 | , | Partial private keys for producer and consumer | 10 | , | Partial public keys for producer and consumer | 11 | , | Secret values of producer | 12 | , | Secret values of consumer | 13 | , | Full private keys of producer and consumer | 14 | , | Public keys of producer and consumer | 15 | IDpr, IDcr | Identities of producer and consumer | 16 | Ω | Reencryption key | 17 | CNT | It means the contents (plain text) | 18 | Lfk | Level-1 encryption key | 19 | Lfk | Level-2 decryption key | 20 | Npr | Fresh nonce | 21 | | Level-1 encryption | 22 | Φ | Level-2 encryption | 23 | | Used for encryption and decryption |
|
|