Research Article

A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems

Algorithm 5

Final public key update.
1: Input: Shared attribute set.
2: Output: New final public key .
3: If the attributes are the same, the previous computations over attributes are considered.
4: Else, perform calculations for attributes from to .
5: Map attribute in shared set to . Apply hash function and compute using Equation (5). Then, compute :
      
6: Next, compute final public key component , for attribute using Equation (7).