Research Article
Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT
| Notation | Meaning |
| | The universe set of attribute authorities | | The set of corrupted attribute authorities | | The set of attribute authorities related to the user GID | | The universe set of attributes | | An attribute authority | | The attribute set controlled by | | The global identity of a user | | The attribute set related with user | | The public parameter | | Secret key related to | | Public key related to | | Message | | The LSSS access matrix and its row label function | | Access control structure | | The attribute set related with | | The ciphertext | | The secret key of user | | The outsourced decryption key () |
|
|