Research Article
A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems
| Notation | Description |
| | Security parameter | | A sufficiently large prime number | | An elliptic curve defined over the finite field | | A base point in | | Scalar multiplication, | | Elliptic curve point addition | | Elliptic curve group generated by | | One-way collision resistance hash functions | | Device attribute set | | Secret attribute set | | Shared attribute set | | Access policy, | | Public key components | | Public and secret key pair generated from | | Public and secret keys generated from | | Final secret key components | | Ciphertext | | Finite field over |
|
|