Research Article
Novel Searchable Attribute-Based Encryption for the Internet of Things
Inputs: a binary tree UT, a revocation list , a time period , two empty sets , . | , if , then add to | , if , then add to . | if , add to . | If , then add to . | Return . |
|