Research Article

A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems

Algorithm 3

Final secret key generation.
1: Input: Secret key and shared attribute set .
2: Output:.
3: Compute secret number as follows:
                 
where is the secret key component from and is computed similar to Equation (6) in Algorithm 2.
4: Next, compute Equation (9), which is a -degree at most polynomial in .
      
5: Pick two random numbers . Compute such that the following condition holds.
        
6: Next, compute secret key component u1