Research Article

A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems

Algorithm 4

Partial key pair update.
1: Input: Secret set.
2: Output: New partial key pair .
3: Increment the counter for revoked keys.
4: If the attributes are the same, the previous computations over attributes are considered.
5: Else, perform calculations for attributes from to .
6: Map attribute in to using Equation (1) and compute secret number .
        
7: Next, compute using Equation (3).
8: Next, compute public key component for attribute using Equation (4).