Research Article
A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems
Algorithm 3
Final secret key generation.
1: Input: Secret key and shared attribute set . | 2: Output:. | 3: Compute secret number as follows: | | where is the secret key component from and is computed similar to Equation (6) in Algorithm 2. | 4: Next, compute Equation (9), which is a -degree at most polynomial in . | | 5: Pick two random numbers . Compute such that the following condition holds. | | 6: Next, compute secret key component u1 | |
|