Skip to main content

Advances, Systems and Applications

Table 1 Notations in this paper

From: Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

Symbol

Description

\(\lambda\)

safe parameter

PK

system public key

MK

system master key

SK

user private key

W

keyword

ck

symmetric key

S

user attribute set

U

system attribute set

CT

key ciphertext

\(CT_{1}\)

proxy encrypted ciphertext

\(CT_{2}\)

proxy decrypted ciphertext

\({SK}'\)

intermediate key

P

access policy

\(\Omega _{i}\)

hiding access policy

FID

file identification

HD

file storage address

\(I_{w}\)

keyword index

\(T_{w}\)

keyword trapdoor

E(M)

encrypted file