Table 1 Notations.
From: A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding
Notation | Definition |
|---|---|
\({{\lambda }}\) | Public safety parameters |
\(\textit{k}\) | Updated user attribute collection |
\(\textit{K}\) | User attribute set |
\({{\Lambda }}\) | Ciphertext attribute set |
\(\textit{M}\) | Data plaintext |
\(\textit{GP}\) | Clobal public key |
\(\textit{DD}\) | Updated ciphertext |
\(\textit{VR}\) | Verification results |
\(\textit{UID}\) | User ID |
\((P,\eta )\) | Ciphertext access structure |
\((F,\rho )\) | User access structure |
\(D/D^{\prime }\) | Pre update ciphertext/intermediate ciphertext |
\(Pro/Pro^{\prime}\) | Proof of access before/after update |
\(PK_{U}/PK_{U} ^{\prime }\) | User public key before/after update |
\(SK_U/SK_U^{\prime }\) | User private key before/after update |
\(UK_{UID}/UK_{UID}'\) | User identity key before/after update |
\(Address/Address^{\prime }\) | Pre/post update ciphertext address |