Skip to main content

Table 2 Notations

From: An efficient traceable access control scheme with reliable key delegation in mobile cloud computing

Acronym

Descriptions

 PK

Public key

 MK

Master key

 SK

Secret key

 CT

Ciphertext

 M

Plaintext

 AS

Access structure

 DSK

Delegated secret key

 DCT

Delegated ciphertext

 DO

Data owner

 DR

Data requester/receiver

 IA

Identification authority

 RA

Random number authority

 AA

Attribute authority

 KDS

Key delegation server

 CDS

Ciphertext delegation server

 CS

Cloud server

 TDS

Trusted decryption server

 SDS

Semi-trusted decryption server