Research Article
A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems
1: Input: Shared attribute set. | 2: Output: New final secret key . | 3: If the attributes are the same, the previous computations over attributes are considered. | 4: Else, perform calculations for attributes from to . | 5: Compute secret number using Equation (8). | 6: Next, compute : | | where polynomial has been computed over attributes in Equation (9). | 7: Pick two random numbers and then compute using Equation (10). | 8: Next, compute secret key component using Equation (11). |
|