Research Article
A Distributed Access Control with Outsourced Computation in Fog Computing
Table 1
The meanings of main symbols.
| The symbol | The meaning of each symbol |
| DA | The generic term of distribute authority | AC | Authority center | | The computing time of a bilinear pair | | The computing time of one scalar multiplication in | | The computing time of exponentiation computation in | | The computing time of general hash function | | The computing time of symmetric encryption | | The number of the attribute that the sender possesses | | Related to the user’s access control structure | | Each distribute authority | n | The number of distribute authority |
|
|