Research Article

A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems

Algorithm 2

Final public key generation.
1: Input: Public Key and shared attribute set .
2: Output:.
3: Let be the device attribute string over shared attribute set.
4: Map attributes in shared set to using hash function and compute .
      
5: Next, compute final public key components as: