Advances, Systems and Applications
From: An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing
Notations | Meanings |
---|---|
G 1, G 2 | Groups |
ê | Bilinear paring operation |
H 1 | Hash function |
PK | System public parameters |
MK | System master key |
AA | Attribute authority |
U | Global attribute set |
A i | Attribute i |
D i | Private key of attribute i |
M | Plaintext |
T i | Access structure |
x | Node in the access tree |
Δ i,S(x) | Lagrange interpolation function |
q x | Polynomial defined by AA |
p x | Polynomial defined by signer |
v | Signature to be verified |
id l | Identity of user l |