Research Article

Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT

Table 2

Notations.

NotationMeaning

The universe set of attribute authorities
The set of corrupted attribute authorities
The set of attribute authorities related to the user GID
The universe set of attributes
An attribute authority
The attribute set controlled by
The global identity of a user
The attribute set related with user
The public parameter
Secret key related to
Public key related to
Message
The LSSS access matrix and its row label function
Access control structure
The attribute set related with
The ciphertext
The secret key of user
The outsourced decryption key ()