Table 1 Notations.

From: A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding

Notation

Definition

\({{\lambda }}\)

Public safety parameters

\(\textit{k}\)

Updated user attribute collection

\(\textit{K}\)

User attribute set

\({{\Lambda }}\)

Ciphertext attribute set

\(\textit{M}\)

Data plaintext

\(\textit{GP}\)

Clobal public key

\(\textit{DD}\)

Updated ciphertext

\(\textit{VR}\)

Verification results

\(\textit{UID}\)

User ID

\((P,\eta )\)

Ciphertext access structure

\((F,\rho )\)

User access structure

\(D/D^{\prime }\)

Pre update ciphertext/intermediate ciphertext

\(Pro/Pro^{\prime}\)

Proof of access before/after update

\(PK_{U}/PK_{U} ^{\prime }\)

User public key before/after update

\(SK_U/SK_U^{\prime }\)

User private key before/after update

\(UK_{UID}/UK_{UID}'\)

User identity key before/after update

\(Address/Address^{\prime }\)

Pre/post update ciphertext address