Research Article

Novel Searchable Attribute-Based Encryption for the Internet of Things

Figure 3

System procedures. The data management system contains four participants, and each participant operates as shown in the figure.