Research Article
A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems
1: Input: Shared attribute set. | 2: Output: New final public key . | 3: If the attributes are the same, the previous computations over attributes are considered. | 4: Else, perform calculations for attributes from to . | 5: Map attribute in shared set to . Apply hash function and compute using Equation (5). Then, compute : | | 6: Next, compute final public key component , for attribute using Equation (7). |
|