Research Article

Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT

Table 2

and that can be obtained by , where and .