Research Article
A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems
1: Input: Secret set. | 2: Output: New partial key pair . | 3: Increment the counter for revoked keys. | 4: If the attributes are the same, the previous computations over attributes are considered. | 5: Else, perform calculations for attributes from to . | 6: Map attribute in to using Equation (1) and compute secret number . | | 7: Next, compute using Equation (3). | 8: Next, compute public key component for attribute using Equation (4). |
|