Table 1 Comparison of symbols and their specific meanings.

From: Privacy protection of communication networks using fully homomorphic encryption based on network slicing and attributes

\(F(x)\)

Determining factor of migration

\(x\)

Service node

\(\sum {( \cdot )}\)

Weighted average of all elements in a column

\(y\)

Starting point of migration

\(T_{d} (x)\)

Delay during the transmission process

\(S_{c} (x)\)

Size of the server capacity

\(B_{\max } (x,y)\)

Maximum bandwidth between two service nodes

\(R_{d} (x)\)

Delay in the return journey between two service nodes

\(C_{p} (x)\)

Cost price of the server

\(\beta\)

Return on migration time

\(n\)

Number of nodes

\(C_{n}\)

Total amount of migrated data

\(T\)

Migration cycle

\(R_{n}\)

Channel transmission rate

\(t\)

Migration time

\(C_{n - 1} (t)\)

Amount of data at the current time

\(v\)

Mobile terminal speed

\(R_{n} (th)\)

Threshold of the minimum migration rate of the current time point node

\(\overline{E}\)

Average energy consumption of data migration

\(E_{t}\)

Energy consumption of the current node

\(P\)

Transmission power

\(E_{\min }\)

Minimum migration energy consumption

\(CH\_Gen\)

Key generation function

\(\lambda\)

Safety parameter

\(P_{k}\)

Public key for outputting the chameleon hash

\(S_{k}\)

Private key of the chameleon hash

\(CH\_Hash\)

Hash generation function

\(r\)

A random number

\(m\)

Any information

\(h\)

Hash value

\(p\)

A random value

\(CH\_Ver\)

Hash collision function

\(m^{\prime}\)

New information

\(r^{\prime}\)

A new random number

\(P_{k} (CH)\)

Public key for the temporary threshold of the chameleon hash function

\(S_{k} (CH)\)

Private key for the temporary threshold of the chameleon hash function

\(N_{1}\)

A composite number obtained through an asymmetric encryption algorithm

\(e\)

A prime number

\(H_{1}\)

Hash function

\(d_{1}\)

Threshold value

\(mP_{k} (ABE)\)

Public key of the BTA-AHEA input

\(mS_{k} (ABE)\)

Private key of the BTA-AHEA input

\(p_{1}^{\prime }\), \(p_{2}^{\prime }\),\(p_{3}^{\prime }\)

Subgroups of the composite group

\(N\)

A composite number

\(CT\)

Cipher-text

\(\overline{CT}\)

Set of cipher-text

\(CT^{\prime}\)

Updated cipher-text

\(s\)

A random vector

\(t\)

A random integer

\(N_{2}\)

A composite number

\(r\)

A random number

\(D\)

Set of decryption functions

\(\overline{{K^{\prime}}}\)

Set of keys

\(r^{\prime}_{1}\),\(r^{\prime}_{2}\)

The random numbers corresponding to the two threshold values \(d_{1}\) and \(d_{2}\)