Research Article
A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems
Algorithm 2
Final public key generation.
1: Input: Public Key and shared attribute set . | 2: Output:. | 3: Let be the device attribute string over shared attribute set. | 4: Map attributes in shared set to using hash function and compute . | | 5: Next, compute final public key components as: | |
|