E ﬃ cient Lattice CP-ABE AC Scheme Supporting Reduced-OBDD Structure for CCN / NDN

: In line with the proposed 5th Generation network, content centric network / named data networking (CCN / NDN) has been o ﬀ ered as one of the promising paradigms to cope with the communication needs of future realistic network communications. CCN / NDN allows network communication based on content names and also allows users to obtain information from any of the nearest intermediary caches on the network. Due to that, the ability of cached content to protect itself is essential since contents can be cached on any node everywhere, and publishers may not have total control over their own published data. The attribute based encryption (ABE) scheme is a preferable approach, identiﬁed to enable cached contents to be self-secured since it has a special property of encryption with policies. However, most of the proposed ABE schemes for CCN / NDN su ﬀ er from some loopholes. They are not ﬂexible in the expression of access policy, they are ine ﬃ cient, they are based on bilinear maps with pairings, and they are vulnerable to quantum cryptography algorithms. Hence, we propose the ciphertext policy attribute based encryption access control (CP-ABE AC) scheme from a lightweight ideal lattice based on ring learning with error (R-LWE) problem, and demonstrated its use in practical applications. The proposed scheme is proved to be secure and e ﬃ cient under the decision ring LWE problem in the selective set model. To achieve an e ﬃ cient scheme, we used an e ﬃ cient trapdoor technique and the access tree representation of access structure describing the access policies was modiﬁed into a new structure, based on a reduced ordered binary decision diagram (reduce-OBDD). This access structure can support Boolean operations such as AND, NOT, OR, and threshold gates. The ﬁnal result showed that the proposed scheme was secure and e ﬃ cient for applications, thereby supporting CCN / NDN as a promising paradigm.


Introduction
The rapid growth of the utilization of mobile and network resources has led to an increase in global network traffic every year.This is one of the most apparent concerns for mobile and network operators.To manage this huge network traffic and slow throughput, several architectures have been proposed to accommodate this rapid growth and its associated problems.One of these proposed architectures is called content centric networking/named data networking (CCN/NDN).CCN/NDN is one of the technologies of the information centric network (ICN) based on 5G network architecture.The main basic features in CCN/NDN architectures are interest-based content retrieval, content-aware naming and routing at the network layer, and in-network caching.
In the CCN/NDN network layer, the sender does not directly send packets (contents) to the receivers and receivers do not access packets (interests) from the data owner.Data owners rather publish content to all networks without necessarily knowing the interested users of the content.These users of the content then request their content without knowing the publisher.Here, the rule for Symmetry 2020, 12 the transaction is evidence of a match between the publisher and subscribers to be followed by the establishment of a delivery path, to enable the delivery of content.The main advantages of this mechanism are, the network nodes cache the content for a fixed period of time and the same content can be requested multiple times, and satisfied from the node without contacting the content owners.
In adopting this phenomenon, we considered a typical internet of things (IoT)-CCN/NDN scenario depicted in Figure 1.This system consists of publisher, IoT CCN/NDN, and the consumers.The content publishers broadcast content that can be cached in all networks and can be accessed and retrieved from any intermediate node.For example, after Bob retrieves content from the server, the content is cached on each of the intermediate nodes, so Alice and Vic can access the same content from node F, and Oscar can also access the same content from node G.
Symmetry 2020, 12, x FOR PEER REVIEW 2 of 23 users of the content then request their content without knowing the publisher.Here, the rule for the transaction is evidence of a match between the publisher and subscribers to be followed by the establishment of a delivery path, to enable the delivery of content.The main advantages of this mechanism are, the network nodes cache the content for a fixed period of time and the same content can be requested multiple times, and satisfied from the node without contacting the content owners.
In adopting this phenomenon, we considered a typical internet of things (IoT)-CCN/NDN scenario depicted in Figure 1.This system consists of publisher, IoT CCN/NDN, and the consumers.The content publishers broadcast content that can be cached in all networks and can be accessed and retrieved from any intermediate node.For example, after Bob retrieves content from the server, the content is cached on each of the intermediate nodes, so Alice and Vic can access the same content from node F, and Oscar can also access the same content from node G.The CCN/NDN has different techniques with regard to its security model.The security component of CCN/NDN modifies the security approach to secure the cached content, instead of the traditional approach of securing network paths for all the networks.The effective way to achieve a required secured data sharing is to provide more scalable and flexible access control for this pervasive and distributed CCN/NDN environment [1].Fortunately, attribute-based encryption (ABE) cryptosystem has been proposed as a fine-grained access control mechanism for CCN/NDN based on the 5G communication network.
The attribute based encryption scheme comes with two main aspects, namely cipher text-policy ABE (CP-ABE) scheme and key-policy ABE (KP-ABE) scheme.With these schemes, users can recover a message if their attributes fulfill the requirement of the access structure.Ciphertext policy ABE (CP-ABE) has some special properties and advantages, over symmetric, asymmetric and KP-ABE.It also has an impressive property of manufacturing and describing access privileges of users in a more intuitive and scalable way.Further, by using this scheme and without prior knowledge of the receivers of information, data could be shared according to the encrypted policy.
Basically, there are two approaches to designing the algorithms of ABE encryption schemes, and these are bilinear map over elliptical curve and the lattice-based approach.However, several gaps and problems exist in the implementation of these algorithms over the years.By and large, these gaps and problems could be mainly categorized into high communication overhead during cipher text uploading and downloading, high computational cost, the problem of quantum and post-quantum attacks and attacks on the plaintext.There are several access control schemes proposed for CNN/NDN.However, most of these exiting proposed access control schemes are based on a bilinear map over the elliptical curve [2,3].Some of these works have large computational overhead during encryption and decryption.They also have a high communication overhead during ciphertext uploading and downloading.These massive storage overheads require additional properties of The CCN/NDN has different techniques with regard to its security model.The security component of CCN/NDN modifies the security approach to secure the cached content, instead of the traditional approach of securing network paths for all the networks.The effective way to achieve a required secured data sharing is to provide more scalable and flexible access control for this pervasive and distributed CCN/NDN environment [1].Fortunately, attribute-based encryption (ABE) cryptosystem has been proposed as a fine-grained access control mechanism for CCN/NDN based on the 5G communication network.
The attribute based encryption scheme comes with two main aspects, namely cipher text-policy ABE (CP-ABE) scheme and key-policy ABE (KP-ABE) scheme.With these schemes, users can recover a message if their attributes fulfill the requirement of the access structure.Ciphertext policy ABE (CP-ABE) has some special properties and advantages, over symmetric, asymmetric and KP-ABE.It also has an impressive property of manufacturing and describing access privileges of users in a more intuitive and scalable way.Further, by using this scheme and without prior knowledge of the receivers of information, data could be shared according to the encrypted policy.
Basically, there are two approaches to designing the algorithms of ABE encryption schemes, and these are bilinear map over elliptical curve and the lattice-based approach.However, several gaps and problems exist in the implementation of these algorithms over the years.By and large, these gaps and problems could be mainly categorized into high communication overhead during cipher text uploading and downloading, high computational cost, the problem of quantum and post-quantum attacks and attacks on the plaintext.There are several access control schemes proposed for CNN/NDN.However, most of these exiting proposed access control schemes are based on a bilinear map over the elliptical curve [2,3].Some of these works have large computational overhead during encryption and decryption.They also have a high communication overhead during ciphertext uploading and downloading.These massive storage overheads require additional properties of securing cached contents to authenticate each content consumer.Above all, almost all the proposed schemes for CNN/NDN paradigm are susceptible to quantum attacks.The above-mentioned challenges make most of the existing ABE access control schemes unattractive for CCN/NDN.Herranz et al. [4] and Chen et al. [5] proposed constant ciphertext-policy ABE (CP-ABE) schemes to address the issues of client high computational cost.However, their schemes are inexpressive and based on AND gate and threshold function by the large-scale ciphertext.An outsource computational ABE scheme was proposed by Hohenberger and Waters [6] and Lai et al. [7].These schemes have high communication cost and most of the encryption and decryption computations are outsourced.In order to reduce the policy scale, Zhou and Huang [8] proposed a minimum sum of product expression and Song et al. [9] proposed minimum linear code, respectively, to minimize the policy scale.A small-scale policy that has less ciphertext redundancy, the reduction of redundancy is limited and unstable.A compact ciphertext-policy ABE (CP-ABE) scheme was proposed by [10] to compact the policy scale and reduce ciphertext redundancy.However, the above-mentioned schemes are based on bilinear maps with high computational complexity and could not address the problem of quantum and post-quantum attacks.
To address the problems of quantum attacks, the researchers of [11] first introduced the idea of the lattice into cryptography.There has been recent progress in the area of quantum cryptography including lattice-based ABE schemes.Zhu et al. [12] proposed KP-ABE scheme using a threshold access policy for the ideal grid based on the R-LWE problem, which proved to be CPA secured.However, this scheme could not satisfy the attack on plaintext security as claimed by the authors.Instead of adopting the preceding approaches, LSSS CP-ABE access control scheme from the lightweight ideal grid was proposed by Tan et al. [13], which can resist collision attacks.Yan et al. [14] used the LSSS access structure to propose the ideal multi-agency CP-ABE scheme.Wang et al. [15] achieved an effective encryption scheme based on R-LWE with high encryption power.The decryption run time and integrity support features are based on chosen cipher-text security.In 2018, authors of [16] proposed the attribute-based encryption scheme supporting tree-access structure from ideal lattices.They used an expressive and flexible access policy by Shamir threshold secret sharing technology, including "and", "or", and "threshold" operations.In order to construct more efficient lattice-based ABE to resolve inefficient issues in the lattice ABE cryptosystem, the accessed structures and some components such as the trapdoor design and the matrix dimension which play a significant role in the construction of the lattice based ABE scheme need to optimize.Hence, the main contribution of our work is to propose a flexible and efficient CP-ABE access control scheme based on ring learning with error supporting reduced-OBDD for CCN/NDN.

Clarification of Problem and Contribution
In spite of the enormous benefits of the CCN/NDN technique, security challenges are some of its major concerns.These security challenges consist of the design of secured, efficient, and flexible schemes to secure cached data and also protecting data from illegal data modification, unauthorized access, as well as impersonated data dissemination and retrieval.The CP-ABE scheme is a newly preferable solution identified to achieve access control in CCN/NDN.This security scheme has special properties of encrypting with access policies.It also allows content to be self-protected when they are cached and can be accessed by many users.
However, most of these proposed CP-ABE AC schemes have some loopholes which make them unappealing.Some of these problems which we address in this paper are: (i) They are not flexible, i.e., they cannot support many access policy operations such as AND, OR, NOT, and threshold gates.(ii) They are inefficient, i.e., the computation and communication of secrete keys and ciphertext take a long time.(iii) They vulnerable quantum attacks (i.e., they are based on bilinear maps with pairing and are not quantum secured for polynomial time quantum algorithms.Above all, most of the proposed secured CCN/NDN information sharing systems cannot secure cached contents from some entities such as trusted service providers and cache routers.Therefore, cache routers can conspire with some users to act maliciously when the contents are cached.
To address the challenges and limitations described above we CP-ABE AC scheme which has the following characteristics: (i) The proposed CP-ABE AC scheme from ideal lattice supports a reduced-OBDD access structure.
Reduced-OBDD offers a compact and optimized access structure with fewer nodes and paths.Encryption and decryption are performed by waking on the path instead of using nodes.This means that it has a lower encryption and decryption computational time over rings.(ii) The proposed scheme supports Boolean operations such as AND, OR and threshold gate.
Also, it can support multiple subscribers of positive and negative attributes in strategy.(iii) Our scheme is quantum secured for polynomial time quantum algorithms based on the assumption of R-LWE.Due to the algebraic construction from the ideal lattice, it is more effective than schemes based on ring learning LWE.(iv) Our scheme has an improvement over the sample right algorithms with a stronger trapdoor and efficient sampling based on the discrete Gaussian in O(log c n) instead of Ω n 2 log 2 n .Finally, we integrate the proposed reduced-OBDD CP-ABE over ring LWE with CCN/NDN platform and demonstrate how it could be used to provide an access control scheme to enable content to be self-secured against quantum attack.

Methods
The attribute based encryption scheme represents a promising proposal for content centric network.However, it has some drawbacks such as computational time and flexible access control expression.To deal with these problems and to ensure efficient a secured data sharing over CCN, the following methodologies were used.

Flexible and Expressive Access Policy
Our scheme supports reduced-OBDD: We constructed our access policy from reduced ordered binary decision diagram.This approach is simple but very efficient and expressive.Based on recursive Shannon theorem, f (x x n ), we constructed a reduced binary decision diagram to represent our access structure.By adopting this approach, a Threshold access structure of five levels with sixty-three (63) nodes can be reduced to six (6) nodes which can perform the same function but in a more efficient way.This structure can support the threshold gate, Boolean operations such as AND, OR, NOT, and also, multiple subscribers of positive and negative attributes in the strategy.To deal with negative attributes, we modified the proposal in [17] by attaching the negative attributes to a default attribute.

Optimized Algorithms
Compact and optimized access policy: Reduced-OBDD offers a compact and optimized access structure with fewer nodes and links.However, instead of using the number of nodes for our encryption and decryption, we used the links between the nodes which have a direct positive impact on our encryption and decryption algorithms.The terminal nodes with constant meanings were deleted.This means that our scheme has less encryption and decryption computational time over rings.
Optimized sampling algorithm: Instead of using sample left algorithm used by various construction, we combined the theorem of MP12 [18] to construct an efficient trapdoor.We also design an optimized sampling algorithm to output an invertible matrix m.This is a significant method for delegating trapdoor and sample right algorithm with a trapdoor protocol.The matrix m is obtained from a discrete Gaussian execution time of O(log c n) with a trapdoor quality approximately 1.6(n log q) 1/2 and matrix m dimension approximately 2n log q.Hence, our scheme has an improved storage capacity as compared with other relevant schemes such as [19].The performance analysis shows that the size of the master key, secret key, and the ciphertext expansion size is much lower.This is detailed in Table 1.

Efficient Secured Content Sharing Over CCN/NDN
The ABE scheme has a general computation loophole.To ensure an efficient secured content sharing system, we will adopt a hybrid technique by combining our proposed reduced-OBDD based ABE AC with asymmetric key encryption scheme.An asymmetric encryption scheme known to be efficient is used to encrypt the content needed by the consumer and the proposed reduced-OBDD CP-ABE AC scheme from lattice is used to encrypt the content policy which contains the password or the secret key and other relevant information about the content data to decrypt the content.The content policy is issued with a time value and periodic automatic update properties to ensure the management of our system, and also allows user's features to be updated individually.

Organization
The remaining of the paper is organized as follows: In Section 2, we review some relevant related work.The preliminaries are discussed in Section 3. We demonstrate our access structure and our scheme in Section 4. The performance analysis of our scheme is presented in Section 5.The integration of our proposed scheme into CCN/NDN systems is discussed in Section 6, and this paper is concluded in Section 7.

Encryption Access Control Schemes from Lattice
Lattice cryptography is considered to be the preferred cryptography system for quantum security due to its wide applicability [20] and its security proof is based on known lattice problems in the worst case of hardness.Lattices have since then achieved a lot of fame for constructing numerous diverse cryptography schemes.An efficient identity-based encryption (IBE) system from lattice was proposed by Agrawal et al. [21].The authors of [22] proposed CP-ABE scheme lattices.Their scheme is flexible and supports (k, n) threshold access policies on Boolean attributes.Zhao and Gao [23] proposed the KP-ABE mechanism for the subclass circuit using a short size matrix secret key for the OR gate and proved to be secured against the chosen-plaintext attack in the selective model under the assumption of learning with error.Based on full-rank differences function, the authors of [24] proposed a large universe CP-ABE scheme to attain improvement in the expression of attributes and unbounded attribute space.
Unlike previous solutions, Nguyen et al. [25] presented a server-side revocable IBE scheme base on the LWE assumption.The re-encryption approach was used to allow smooth interaction between the server and the user as ensuring messages confidentiality.An efficient revocable ABE scheme was constructed by [26], their revocation of attributes and grants is based on a binary tree approach.A single random vector parameter was selected for nodes corresponding to attributes.To solve some open issues, a bonsai tree, which is a cryptography structure based on lattice, was proposed by David Cash [27].In reference [28], the ABE scheme from LSSS based on lattices was proposed.This scheme eliminates the ranks and columns of the matrices to merge a preferred structure in the decryption stage.virtual encryption matrix in the key generation phase, which is reasonably dissimilar from the universal techniques in the present ABE schemes from lattice-based cryptography.Based on the LSSS matrix and from the lattice, an ABE mechanism was constructed using a distinct common lattice approach to execute the same task.However, the number of secret keys grows exponentially with the number of inputs which will cause a restriction to the initial parameters [29].
An efficient HIBE scheme with a new delegation mechanism was proposed by Agrawal et al. [19].This technique does not increase the involved lattice's dimensions.In [30], a flexible ABE from lattice for multi-authority was which support AND, OR, and threshold operations.They used optimized Gaussian sampling and trapdoor algorithms to achieve a remarkable efficiency with less storage capacity.Using a standard model, the authors of [31] proposed a lattice-based threshold hierarchical ABE scheme based on a lattice.Their scheme is secured against a selective attribute set and chosen-plaintext attacks under the LWE problem without random oracle.Meanwhile, they didn't use the same attributes level.

Secured Content Centric Network (CCN/NDN)
One of the common ways of ensuring a secured content sharing on ICN is by access control approach.Information centric network systems allow inter network caches by a cached router which is presumed to be secured and honest.However, it is not always practical.Since content is cached in anywhere on the internet, content publishers have difficulties to control access to their own published content.A restricted named mechanism that restricts names to only legitimate consumers was proposed by [32].This approach is not sufficient since the name of the content can be easily identified.To improve upon access control mechanisms in CCN (securing the content and its name) from unauthorized users, several mechanisms have been proposed, such as attribute encryption access, [33][34][35] proxy re-encryptions, and broadcast encryption access control schemes [36,37].
Attribute based encryption has gained popularity among other cryptographic approaches due to its special encryption properties based on policies.According to [38], the identity of legitimate users is considered as attribute set and base on that, the massage owner encrypts content to be shared based on some selected condition.Here, only users whose attributes match with that condition can extract the content for consumption.However, attribute-based encryption mechanisms need a trusted party to manage the system and regulate users' attributes which are sometimes impractical.
In [39], we proposed an efficient CP-ABE scheme for IoT CCN based on ROBDD for IoT data sharing on CCN.This scheme has a better decryption stage and offers resistance to collision attacks.The efficiency of the proposed scheme is based on the efficiency of the ROBDD structure.From our performance analysis, this scheme achieved high efficiency in terms of key generations, encryption operation and decryption operations as compared to most of the existing CP-ABE schemes proposed for IoT CCN.However, our previous access control scheme is based on bilinear maps with high computational complexity and could not address the problem of quantum and post-quantum attacks.
The proposed proxy re-encryption and broadcast encryption mechanisms hide the data and its name from the nodes of the network which sends the content to the legitimate users.However, securing the name only is not enough since an attacker can pretend to express the same interest.However, a random approach can be used to randomize the original content with some noise so that the attacker cannot find the original content.However, this technique leads to communication overheads [40].
On the whole, the aforementioned mechanisms cannot secure the content from some entities, and cache routers can conspire with the users to act maliciously when the contents are cached.Moreover, all of these access control schemes for CCN/NDN are based on bilinear maps with pairing and are not quantum secured for polynomial time quantum algorithms.Now, we consider an integer lattice, where Λ belongs to the set of Z m .We denote the determinant of Λ as det(Λ).

Definition 2. ([41]
): For a prime q, A ∈ Z n×m q and A ∈ Z n q define.Λ q (A) ∼= e ∈ Z m s.t.∃s ∈ Z n q where A T s = e(mod q) Definition 3. (An m-dimensional lattice [41]): An m-dimensional lattice is both an additive subgroup: (o ∈ Λ, and x, x + y ∈ Λ for every, y ∈ Λ) and discrete (every x ∈ L has a neighbor in R m where x is the only lattice point).The minimum distance of lattice Λ is the length of a shortest non-zero lattice vector λ 1 (Λ) := min v∈L\{0} v , where v denote Euclidian norm.Generally, i − th successive minimum λ i (L) is the smallest r such that Λ has i linearly independent vectors of the norm at most r.
Definition 4. (Ideal lattice [41]): A lattice Λ ∈ Z n is an ideal lattice if there exists a ring R = [x]/ f and ideal I ⊆ R such that Λ is associated with I.
Definition 5. (Gram-Schmidt norm of a basis [41]): Given G = (g i ) i∈I as a finite basis and Ĝ = ĝi i∈I as Gram-Schmidt orthogonalization.The Gram-Schmidt norm G is the value of Ĝ ∼= max i∈I ĝi .
There are two relevant properties of Gram Schmidt dorm and its bases which are beneficial to the construction lattices.These are: (1) They are quick to compute (The Gram-Schmidt norm for a general lattice is obtained by conducting the Gram-Schmidt process to the basis of the lattice and compute the maximum length of the resultant vector).(2) Their size can be small (The size of the lattice which we compute Gaussian sampling and the sample of the private key size should be proportional to Ĝ , where G is lattice basis).Therefore, it is significant that Ĝ ∼= max i∈I ĝi should be small as possible.According to [18], a full rank set G in a lattice can be converted into T with an equally low Gram-Shmidt norm Ĝ of G Lamma 1. ([18], Lemma 7.1): Given Λ as an m-dimensional lattice, there is a deterministic polynomial-time algorithm that gives an arbitrary basis of L and a full rank ).For a matrix L, we define the discrete of ρ σ,c as ρ σ,c (L) = x∈L ρ σ,c (x).The discrete Gaussian distribution over L set as D L,σ,c and then ∀y ∈ L, the discrete Gaussian distribution over L is defined as: Symmetry 2020, 12, 166 8 of 23 3.3.Some Significant Algorithms

Algorithm Generation of Trapdoor
Theorem 1. LatticeTrapGenAlg (R, D) → (ê, T ê) .A probabilistic polynomial-time (PPT) algorithm in an existence accepts inputs of R ∈ Z n×m q , D ∈ Z n×n q , parameters q, n ≥ 1,m = O(log q), w = nt, where t = log 2 q. ρ ∈ ZX is a polynomial with n degree.The algorithm outputs (ê, Where ∈ Z n×w q , T ê ∈ Z m×w q and a small trapdoor bases for lattice Λ ⊥ q A T ρ which satisfies L T ê ≤ Ô √ n .

Algorithm for Preimage Sampling
Theorem 2. PreimSampAlg(ê, T ê, P, α, σ) → â ∈ Z m .A PPT algorithm accepts inputs of e ∈ Z n×m q as a matrix, where q ≥ 2 and m ≥ 2n log q, T e ∈ Z m×m q as the basis of a trapdoor for Λ ⊥ q (M), expected image and parameter for Gaussian is σ ≥ O( n log q) and output â ∈ Z m that satisfies A â = α mod q.Based on PreimSampAlg(M, T M , α, σ), a new preimage sampling algorithm over rings for GenIdealSamPreimAlg() is constructed.
The algorithm takes an input of ê ∈ R m q as a vector, T ê ∈ Z mn×mn q trapdoor of Λ ⊥ q A T ρ (ê) , α ∈ R q as expected image and a parameter of Gaussian σ > T ê .ω(log m) and output ĝ ∈ R m q that satisfies ê ĝ = α.Here, we have: a. Encode:

Decision R-LWE Problem
Init: The adversary chooses a specific access structure and sends to the Challenger Given n as security parameter, let d and q be an integer that depends on n.Where f (x) = (x n + 1) and R q = R/qR, let R = Z[x]/( f ).Given a distribution χ over R q depending on n, the Decision learning with error problem instance consist of access to an unspecified challenge oracle o, either a noisy pseudo-random sampler O s , for random secrete key S ← R q ; or a truly random sampler O $ .The Decision R-LWE problem is to distinguish the sampling between O s and O $ , which perform respectively as follows; O s : Given a uniform distribution constant invariant value across invocation as S ∈ Z n q , a new sample x i ∈ Z q from χ and a uniform sample u ∈ Z n q .Output a sample of form as (u i, v i = u i .uT i S + x i ) ∈ Z n q × Z q .O $ : An exact uniform output sample (u, v) drawn from Z n q × Z q .The aim of the decision ring-LWE problems is to allow repeated quarries to be sent to the challenge oracle O.The Attacker's algorithm decides the decision ring-learning with error problem if |Pr [Attacker o s = 1] −Pr[Attacker o $ = 1] is non-negligible random value for s ∈ Z n q .Given x defining

Access Structure
Assuming P = p 1 , p 2 , . . .p n is a set of parties.Let 2 p represent subsets contained in p 1 , p 2 , . . .p n and ∈ 2 p .The collection of ST ∈ 2 P={p 1 ,p 2 ,...p n } is known as an access structure.
Symmetry 2020, 12, 166 9 of 23 The set contains in ST ∈ 2 P={p 1 ,p 2 ,...p n } are called authorize sets and sets ST 2 P={p 1 ,p 2 ,...p n } are called unauthorized sets.The access is monotone if f or all Q, A : i f A ∈ ST and A ⊆ Q then Q ∈ ST.

Reduced Ordered Decision Diagram (Reduced-OBDD)
Reduced-OBDD is based on a fixed ordering of variables and has the additional property of being reduced.This means that it is irredundant, unique, and recovers the important canonicity property.Thus, for a fixed variable ordering, each Boolean function has a canonical (unique) representation as a Reduce-OBDD and checking if they are of equal or the same successors.If there are two distinct nodes u and v have the same variable name and low and high successor, i.e., if var(u) = var(v), low(u) = low(v) and high(u) = high(v), implies u = v and no variable node u has identical low and high successor, i.e., low(u) and high(u).

Ciphertext-Policy Attribute Base Encryption Model
The CP-ABE basic algorithms include the following four fundamental operations (Setup, Encrypt, KeyGen, Decrypt).
Setup (λ): This algorithm takes security parameter λ as input and outputs the public key PK and master key MK. Encrypt

Constructing Boolean Function of an Access Policy
We suppose the access policy of a Boolean function is and n as the whole number of attributes, denotes a sequential predefined access policy number which is represented as u(0 ≤ i ≤ n − 1).The function f (u 0 , u 1 u n−1 ) is converted between fundamental logical operations such as AND, OR, and NOT.
An operation is considered as threshold gate T(t, n) if and only if t attributes of a subset n can complete the operation successfully.To be able to decrypt a message in a security system, a user must be able to complete some specific threshold operations.To construct a Boolean function of a given T(t, n ∈ N), Where N is the attribute set, extract all the subset of N with t attributes and separately compute the whole number of subsets C(n, t) = Com1, Com2 • • • Com C(n,t) by using permutation and combination.This is followed by the construction of a separate set level conjugate for each subset i=1 Con i by a disjunctive operation on C(n, t).

Reduced-OBDD Access Structure Construction
To construct reduced-OBDD for Boolean function f (x 1 x 2 • • • x n ), we use the recursive algorithm (Algorithms 1 and 2) based on the expansion theorem of Shannon.To obtain a specific and unique reduced-OBDD, the definition of the variable ordering must be specified since different ordering results to different kinds of diagrams.Given a logic function in terms of selected inputs and the required input for logic synthesis using a multiplexer.For any Boolean function f (x The process based on Shannon's expansion theorem is described as follows: Let N = {0, 1, 2, • • • n} be node numbers where the low terminal node is 0 and the high terminal node is 1.However, the terminal nodes have specific meanings and their attributes may not be considered.The variable ordering Ω related to 1 is the inverse of the table Table 2 which stores the reduced-OBDD.In Algorithm 1, Table 1 is initialized to be ones (1) and zeros (0) lookup function Table 1:(w, id, low, high) maps node w to its attributes var(w) −→ id , low(w) −→ low and high(w) −→ high .To construct an ordered binary decision diagram from the id, low, and high if there must be an existence of the node with variable key var(w) −→ id , low(w) −→ low , and high(w) −→ high .In Algorithm 2, Table 2 is initialized to be empty and find out if there exist of id, low and high in.(id, low, high) −→ w maps attributes (id, low, high) to w such that for all variables nodes w, Table 1 (w) −→ (id, low, high) if Table 2 (id, low, high) −→ w .After the construction of all nodes Nd of the reduced-OBDD, the final expression is obtained as Reduced − OBDD = Nd i id , where i denote all the attributes in the structure and id is the set containing the serial numbers of non-leaf nodes.The final table of Nd i id (w, id, high, low) contains the id of the current node id, the id of the attribute in the current node i, the id of the high branch high and the id of the low branch low.Hence, the access structure

Satisfying Reduced-OBDD Structure
Let T be access structure, attributes set be A s and let the valid path be the path from the root node to the terminal (1) be Vx −→ Vx −→ Vx • • • , −→ (1) as shown in Figure 2. Based on node values, a recursive comparison is conducted, starting from the root nodes to the leaf nodes.Thus, for a non-leaf node with an attribute of i ∈ A s is 1, send to the high branch node, otherwise send to the low branch node.This process is repeated until it reaches the leaf node.The set A s satisfied τ if the terminal node is (1).Otherwise, outputs fail.The attributes set A s must satisfy the access structure T (i.e., A s T ) when the leaf node is lastly reached.

Satisfying Reduced-OBDD Structure
Let  be access structure, attributes set be  and let the valid path be the path from the root node to the terminal (1) be  ⟶  ⟶  ⋯ , → (1) as shown in Figure 2. Based on node values, a recursive comparison is conducted, starting from the root nodes to the leaf nodes.Thus, for a nonleaf node with an attribute of  ∈  is 1, send to the high branch node, otherwise send to the low branch node.This process is repeated until it reaches the leaf node.The set  satisfied  if the terminal node is (1).Otherwise, outputs fail.The attributes set  must satisfy the access structure  (i.e.,  ⊨ ) when the leaf node is lastly reached.

Construction Of Reduced-OBDD ABE AC From Lattice
Our proposed CP-ABE scheme supports positive  and negative ¬ attributes.In a brief statement, we have  .( or ¬ ) where  is a default value.Let  represent attribute sent with serial numbers, our algorithms are described below.
(, ): The algorithm is given an input of γ and  as security parameter and attributes set respectively.Denoting P ∈ Z × as a public parameter, let D ∈ Z × be matrix.Randomly select  ∈  × and trapdoor T ∈ Z × with a size of less than or equal to √.( log ).Execute the LatticeTrapGenAlg Algorithm to generate a random matrix A = R DP − RT =   , , where A =   , is inverse of A .Randomly choose a uniform vector  ∈ Z and finally, output the public parameter and the masters key as: = { }

Construction Of Reduced-OBDD ABE AC From Lattice
Our proposed CP-ABE scheme supports positive a i and negative ¬a i attributes.In a brief statement, we have a i .(a i or ¬a i ) where a i is a default value.Let U represent attribute sent with serial numbers, our algorithms are described below.
Setup (γ, U): The algorithm is given an input of γ and U as security parameter and attributes set respectively.Denoting P ∈ Z n×w q as a public parameter, let D ∈ Z n×n q be matrix.Randomly select R ∈ Z n×m q and trapdoor T A ∈ Z m× ŵ q with a size of less than or equal to √ m.w( log q).Execute the LatticeTrapGenAlg Algorithm to generate a random matrix , where  Randomly generate parameter s ∈ R q and error terms θ, θ i,j ∈ X.
The encryption algorithm follows the following steps: i,j = A T i,j .si + θ i,j mod q (4) Symmetry 2020, 12, 166 Then, output ciphertext as CT = C, C (l) i,j i, j∈ T .
Decryption (CT, PP, SK) → (M) : The decryption algorithm takes an input of ciphertext (CT), public parameter (PP), and secret key (SK).Perform recursive Algorithm 3. The algorithm defines the root node as the current node and extracts the current id and the index.The algorithm conducts recursive operations based on a high branch node and the low branch node.If any node is a non-leaf node, the algorithm sets it as a current node.The process continues until it reaches the leaf nodes.Based on the high branch node: if the high branch node is a non − lea f node, set it as a current node; else if the high branch of the node is the low lea f node (0), the algorithm is aborted.Otherwise, the algorithm stores the information in the path next to the leaf node 1.Based on the low branch node, if the low branch node is a non-leaf node, set it as current node; else if the low node is lea f node (0), the algorithm is aborted; else if the node on the high branch node Based on the high branch node low branch is the high leaf node, the algorithm stores the path to the leaf node (1).Define σ i,j = σ i,j ŵ( log m) as Gaussian parameter and continue with the below computation recursively.Compute Lagrange coefficients L I , as ai,j∈A s L I s I = s(mod q) and set Symmetry 2020, 12, 166 14 of 23 If M = q/2 < q/4, the system output 1, else output 0

Correctness and Security Proof
In this section, we provide the security proof and the performance achieved by this work.

Correctness
In order to decrypt CT = (C, {C i } i∈τ ) we have where the error term is: θ − ai,j∈A s L l d T i,j θ i,j .It is required to choose the parameters such that considering the overwhelming probability (w.h.p) of d T i,j ≤ σ i,j m ŵ log m with w.h.p, we have by PreimSampAlg (ê, T ê, P, α, σ) → â such that, d T i,j x i,j is bounded by w.h.p by d T i,j x i,j ≤ qα i,j σ i mv(log m) + σ i,j m 3 2 ŵ log m .
For our trapdoor operation, we choose m ≈ 2n log q to ensure correctness which is less than w.h.p and set α i,j < qv log m + qσ i,j m ŵ(log m)] −1 q > σ i,j m 3 2 ŵ log m (9)

Security Proof
Theorem 3. If the Z q , n, ψ α − LWE notion holds, then with a negligible advantage of ε, there is no polynomial-time adversary A. that can selectively win the security game of our system.
Proof : Assuming there is PPT A attack on the proposed efficiently secured scheme with an advantage of ε > 0, then there exists an algorithm that can distinguish Z q , n, ψ α − LWE problem with an advantage of ε.The problem of LWE is provided as sample oracle O, which can be really random O$ or noisy pseudo-random for some secret key S ∈ Z n p .The challenger's algorithm Sim simulates attack environment and exploits A to which oracle O is given.Initialize: Adversary A, sends the access structure τ * = Nd i∈I id∈ID to the challenger's Simulator B. Instance: B makes a request to the oracle and the oracle responds by sending new pairs of Symmetry 2020, 12, 166 , m I 1 s i +1.
Target: A makes an announcement of the set of attributes that it is intended to challenge Setup: The public parameters are generated by B. Let's denote as 1 .
For A i,j ∈ A s * , generate B outputs a matrix for each a i,j where attributes a i,j A s * , by running a trapdoor algorithm to generate a random matrix R * i,j ∈ Z m×m q and the computes Using A i,j as an input, B generates a random matrix R * i,j ∈ Z m×m q and a trapdoor Finally, B outputs A i = A 0 i R i,j and set PP = {(A i ) i∈A s , α} to the A. Phase 1: A sends a private key request for a set of attributes A G * = a s * 1 , a * 2 , • • • , a * j , where A s * T ∀ ai.B computes α i share of α for each a i .For any legitimate path, there must exist an attributes a j ∈ A I satisfying a j ∈ A s * ∧ a j = ¬a j or a j A s * ∧ a j = a j .Generally, A attributes satisfy the condition a j AS * ∧ a j = a j and each attribute is apportioned as follows: a j A s * ∧ a j = a j , y a j = m•y a j ; for a i a j .
B runs the key generation algorithm to generate A ij = A i R −1 ij and a trapdoor matrix T A ∈ Z m+w q for Λ 1 q A * ij and invokes GenIdealSamPreimAlg A, T A ij , P, α i , σ, function to output d i,j ∈ Z m+v q = Z m q and set the private key of a j * as SK u = d i,j ai,j ∈A s to the A Challenge: A agrees to accept the challenge and submits challenge message (m 0 , m 1 ) ∈ {0, 1} with the attribute set a j * and flips a coin to generate randomly m ∈ (0, 1).B generates a ciphertext as * i,j , τ to A where: It is clear that the encrypted message CT * is valid encryption of m under the access policy of Assuming the adversary A can correctly guess m with a probability of at least 1/2 + ε.Then A can make a decision of the decision ring-LWE problem with an advantage of

Complexity Analysis
The complexity analysis of our scheme is based on the performance of the Boolean operations, the factors that affect the communication time and the factors affecting the execution time.The complexity of the Boolean operations depends on the size of the reduced-OBDD.For a Boolean circuit of 1 − out − o f − n input bit (OR gates) or n − out − o f − n input bit (AND gates,) designed as an output gate, the circuit size of the Boolean function f is the same as the size of the reduced-OBDD structure.Also, the complexity of the reduced-OBDD Boolean function is equal to the reduced depth of Boolean function f .For the function f 1 (w 0 , w 1 , w 2, w 3 ) = w 0 + w 1 w 2 + w 1 w 3 + w 2 w 3 with ordering π : w 0 < w 1 < w 2 < w 3 , the size of the reduced-OBDD is 2n.This could either be linear or exponential depending on the variable ordering.The complexity of the Boolean function operations also depends on the number of nodes in the reduced-OBDD.That is to say, for the AND gate, the various operations of our scheme are expressed as n − out − o f − n threshold while the OR gate and NOT gate are expressed as 1 − out − o f − n threshold.The Boolean operation considers all the nodes of the reduced-OBDD with the complexity of O(n), where n is the number of nodes in the reduced-OBDD.To achieve a better runtime, we deleted the leaf nodes which have specific meanings.
We also improved on the execution and communication time, by reducing some parameters of our scheme such as the size of the trapdoor, the public parameters, the master key size, the secret key size, and the ciphertext.The size of the matrix m is reduced to m ≈ 2n log q to output a reduced and better trapdoor.This implies a reduction in storage and communication cost.The size of the secret key depends on the end user's attributes and the size of the matrix column.The size of our public parameter is smaller due to the small lattice size.
Hence, the complexity of our key generation and decryption algorithm is O(1),.The execution time of the encryption, decryption, and the resulting ciphertext relates to the number of the legitimate paths in the reduced-OBDD instead of the nodes which directly improve the execution, storage and sharing times

Discussion of Simulated Result
In this section, we compare our scheme with some relevant existing schemes.The implementation of this work was conducted on an Intel i7-8700 processor at 2.53 GHz and 8GB memory running Windows 10 operating system of 64 bits.Our scheme was simulated with PALISADE library 1.3 on C++ [42].
The factors considered in the implementation result are execution time and storage capacity of ciphertext, key generation, encryption, and decryption.
Table 1 summarizes the comparison analysis of our proposed scheme with other schemes in terms of key generation, encryption and decryption operation times.The parameters were set as follows: lattice base 1024, 80-bit security, modulus as log 2 q = 24, the attribute universe, U was set as 100, and the sample of attributes used in our encryption was set as l = 10, 20, 30, 40 and 50.In our scheme, for a ciphertext with 50 attributes, the key generation, and the encryption and decryption operations were completed at 89.8, 33.59 and 1.29 milliseconds respectively.Although our key generation was a bit slower, the execution time of our scheme had a better performance in encryption and decryption operations than the schemes in [24,28,31].The efficiency of our encryption and decryption operations is mainly due to the efficiency of our access structure, the choice of our trapdoor and the discrete Gaussian sampling approach.Our discrete sampling is based on the sample performance in O(log c n) times but not Ω n 2 log 2 n times which applied in most schemes.Also, the trapdoor algorithm used to generate the matrix R ∈ Z m×m is efficient which directly improves the system execution time.
Table 2 compares the storage capacity, supported access structures and their operations.The above criteria were used to compare our scheme with three other related schemes in [24,28,31].Our storage capacity analysis was based on the size of the public parameters PP, secrete key size SK, and the expansion of the ciphertext.The following notations were used in this work: U is the initial or universe attributes, A s is the number of attributes in the ciphertext, n × m matrix which relates to A s , s secrete share for each A s and d is the depth of the attributes.The public parameters PP of [24,28,31] are very long as compared to ours of (smn + n) log q.The public parameters of the other schemes are not linearly related to the system's number of attributes.However, they are related to the parameters of the lattice which results in the high storage size.The master key MK and the secrete key sizes of [28,31] are longer than the other schemes.The schemes in [28,31] are based on the sample left approach therefore, their secret keys are related to the number of users' attributes and the cascaded matrix column.In [31], the ciphertext and the key size relate to the number of users, matrix column, and the depth of the attribute hierarchy.
In terms of access structures and their operations, the policies of the schemes in [24,31] are not flexible and therefore do not support a flexible and fine-grain access policy.They are based on threshold gates.The scheme in [31] supports only threshold operation, [24] supports threshold and AND operations whilst the scheme in [28] supports AND, OR and threshold operation which a bit flexible in terms of an access policy expression.In addition to supporting AND, OR, and threshold operations, our scheme also supports negative and positive attributes making it more flexible as compared to the others.Whilst our scheme is based on a reduced ordered binary decision diagram access structure which gives an efficient access policy expression without redundancy, [28] is based on the LSSS matrix without a detailed explanation of how the expression of access policy was conducted.
Our scheme is practical with respect to storage capacity, execution time and is secured against quantum attacks due to the choice of an optimized access structure for our access policy expression, lower dimensional size of lattice, and efficient trapdoor approach used.

Integrating Lattice Based CP-ABE AC with CCN/NDN
This section entails details of the key exchange and the content sharing protocols.To ensure an efficient content sharing system, a hybrid technique is used.An asymmetric encryption scheme, known to be efficient is used to encrypt the content to be shared whiles the lattice CP-ABE AC scheme is used to encrypt the manifest or policy that contains the password or the key to decrypt the content.

System Model
The entities of our system and their description are introduced below: Content Data Publisher (CDP): This can be the owner of the content or a trusted person on behalf of the data owner.He designs access policies, encrypts data and publishes them on the cloud in the ICN approach.
Content Centric Server (CCS): This is the cloud server responsible for content storage and user authentication.The content and the content policy are stored on the CCS in the CCN approach.
Content Data (CD): This is the private information encrypted by the owner and can only be accessed and used by legitimate users.This is stored in the CCN approach and can be accessed by legitimate users from any location A trusted service provider (TSP): The service provider is a trusted authority responsible for key generation encryption and decryption keys for the publisher and the user.This authority runs two main algorithms: (i) Asymmetric encryption algorithm, which is used for the encryption and the decryption of the content (ii) Lattice CP-ABE AC algorithm, which is used to encrypt the content policy which contains the password used to decrypt the content data Content users (CU): These are prospective authorized content users who can access content from anywhere.
Content Policy (CP): We describe the data manifest which stores the information about the content as content policy.This stores the decryption key of the content.It is encrypted with the key which is associated with the user's attribute.The user can obtain the decryption key if his attributes match with the policy enforced on the content.

Our Proposed Secured Information Sharing Scenario
Figure 4 demonstrates a secured information sharing system.In this system, communication is based on one to many information sharing; that is, a publisher and many content users of the same interest and subscription.The main aim of the system is to protect and enforce access control policy on sharing content in the CCN approach so that only users whose properties match with the policy can effectively access and use the content.
TSP generates two pairs of keys to the CU and CDP as follows: (i) The TSP generates a pair of keys {PK, SK} by running KeyGen() in Section 4 to the user upon registration.The user installs the secrete key SK on his device and sends PK, ID) to the Publisher.(ii) TSP runs KeyGen(a ) to generate a pair of keys {PPK, PSK}, and a hashed code of one of the users ID = H(ID) } to the CDP.Let a ∈ R q be a uniformly random value and r 1 , r 2 ∈ R q be a sample from distribution X.The TSP generates p = r 1 − a•r 2 ∈ R q and outputs the public key PPK and secret keys PSK as (a, p) and r 2 respectively.The keys generated to users have time validation and automatic key update property, so users will not receive any update once their keys expire or compromised.When the CDP recieves PPK, PSK, H(ID) from the TSP and {PK, ID} from the CU, he authentics the CU by running a hash function of the ID and compares it with the hash codes, ID = H(ID) } received from the TSP.
Figure 4 demonstrates a secured information sharing system.In this system, communication is based on one to many information sharing; that is, a publisher and many content users of the same interest and subscription.The main aim of the system is to protect and enforce access control policy on sharing content in the CCN approach so that only users whose properties match with the policy can effectively access and use the content.TSP generates two pairs of keys to the CU and CDP as follows: The CU on the other side conduct the following processes: (i) The CU runs the decryption (CT, PP, SK) → (PSK) algorithm in Section 4 to obtain the secret key PSK.To obtain PSK, the user's attributes (SK) must satisfy (PP).(ii) The CU runs Dec(C CD , PSK) to output m = C 1 •r 1 + C 2 ∈ R q to obtain m from m .

Key Exchange Protocol, Encryption and Decryption Model
Figure 5 shows the key exchange process of our and Figure 6 represents content dissemination and retrieval process of our system.In Figure 5, the TSP generates (PSK, PPK) based on an asymmetric encryption scheme and sends it to the CDP through a secured key exchange protocol.
To the CU, the TSP generates a pair of keys (PK, SK) based on CU's attributes.When CU receives (PK, SK), he installs SK on his device and sends PK to the content data publisher.At the end of the key exchange protocol, the user holds a pair of keys which reflects his attributes and the CDP holds three keys which consist of the public key of users (PK) and a pair of asymmetric keys (PPK, PSK).
The encryption and decryption process in Figure 6 consists of the following steps: The content data publisher firstly selects (PPK, PSK) pair of keys and encrypt the content Enc(CD, PPK) (ii) The CU runs ( , ) to output  =  •  +  ∈  to obtain  from  .

Key Exchange Protocol, Encryption and Decryption Model
Figure 5 shows the key exchange process of our and Figure 6 represents content dissemination and retrieval process of our system.In Figure 5, the TSP generates (, ) based on an asymmetric encryption scheme and sends it to the CDP through a secured key exchange protocol.To the CU, the  generates a pair of keys (, ) based on CU's attributes.When CU receives (, ), he installs  on his device and sends  to the content data publisher.At the end of the key exchange protocol, the user holds a pair of keys which reflects his attributes and the The encryption and decryption process in Figure 6 consists of the following steps: The content data publisher firstly selects (,  ) pair of keys and encrypt the content (, ) Secondly, the CDP encrypts the content policy (, ) by taking into consideration the attribute set and the updated policy.The content policy contains the secrete key and some information about the content data, including the hash code of the content data.The CDP encrypts content data () and content policy () and disseminates them unto the cloud server When the  sends for request, the server verifies him and when there is a match between his subscription and the policy, the server replies with the content policy () and the content data  = () sequentially.The CU runs two main decryption algorithm which consists of the following.
(i) Firstly, the user runs the decryption algorithm (( = (), ) in Section 4 to extract the secrete kay  using the secret key  associated with his attribute.(ii) Finally, using , the user extracts his interested content data  by running the decryption ((, )) →  .The user can obtain and utilize the message if and only if his attributes match with the policy enforced on the content policy to obtain the secret key  for decryption of the Content data.

Security Analysis of our System
This section looks at the security analysis of our proposed system.This is based on the privacy Secondly, the CDP encrypts the content policy Enc(CP, PK) by taking into consideration the attribute set and the updated policy.The content policy contains the secrete key and some information about the content data, including the hash code of the content data.The CDP encrypts content data Enc(CD) and content policy Enc(CP) and disseminates them unto the cloud server When the CU sends for request, the server verifies him and when there is a match between his subscription and the policy, the server replies with the content policy Enc(CP) and the content data C CD = Enc(CD) sequentially.The CU runs two main decryption algorithm which consists of the following.
(i) Firstly, the user runs the decryption algorithm Decrypt((CT = Enc(CP), SK) in Section 4 to extract the secrete kay PSK using the secret key SK associated with his attribute.(ii) Finally, using PSK, the user extracts his interested content data CD by running the decryption Dec((CD, PPK)PSK) → CD .The user can obtain and utilize the message if and only if his attributes match with the policy enforced on the content policy to obtain the secret key PSK for decryption of the Content data.

Security Analysis of our System
This section looks at the security analysis of our proposed system.This is based on the privacy of the content and users' authentication 6.4.1.Privacy The proposed system consists of four actors, CU, CP, cloud sever and TSP.After the CU receives his pair of keys (PK, SK) from the TSP, he/she sends PK and one of his IDs = H(ID), to the CP.The CP authenticates the CU and encrypts the content CD with the public key PPK and then lock up the secret key PSK with the public key PK received from the CU.The CP publishes the encrypted content and the encrypted secret key to the cloud server in a content centric approach without leaking any information about the CD and PSK.Here, the cloud server cannot learn anything about the CD and except the encrypted content and the encrypted manifest which contains the key PSK.The CU also sends the public key to the CP without disclosing his private keys.So, if the server or any of the users are malicious, none of them can collude to decrypt the content policy to obtain PSK to decrypt the content.Moreover, an attacker cannot eavesdrop the CU's credentials or pretends to be CP due to the security primitives of the basic scheme described in Section 4.4.However, CP conspiring with the TSP can obtain users' credentials.

Authentication
The content policy or manifest contains the hash code of the content.This enables the user to verify the authenticity of the message and the CP.Hence, the integrity of the content and the legitimacy of the content publisher is assured.

3. 2 .
Gaussian Sampling for a Ring Definition 6. (Gaussian function): Given m ∈ Z and L ⊂ R m as a positive integer greater than zero and m dimensional matrix.Let σ ∈ R greater than zero and c ⊂ R m .A Gaussian-shape function ρ (PK, MK, A): This algorithm takes public parameter PK, plaintext M, and access policy A, to output Ciphertext CT KeyGen (MK, S): The algorithm takes masters key MK and attribute set S as input and outputs the secret key SK.Decrypt (PK, CT, SP): This algorithm takes in public parameter PK, ciphertext CT, and a secret key SK as input and outputs the message M 3.8.Selective Set Model A CP-ABE is secured in a selective -set model if the PP adversary has at most a negligible advantage in the game below.Initial: The adversary Adv.declares the attribute set AS which he wants to challenge.Setup: The setup algorithm is run by the challenger and sends the Pk to the Adv.Phase 1: The Adv. is allowed to make a private request of its choice as long as AS ∈ A Challenge: The Adv. sends two messages of equal length, M 0 and M 1 the challenger.The challenger randomly selects b and encrypt M b using A. The ciphertext is sent to the Adv.Phase 2: Repeat Phase 1. Guess: Adv.output a guesses b 1 of b.The advantage in the security game is defined as Adv = Pr b = b 1 − 1/2

Figure 3 .
Figure 3.The relationship between paths Y i , Y i and i.

2 :
A continues by repeating Phase 1 Decision: A outputs a guess m for m.If m = m .The challenger considered the samples O to be O s sample, else it guesses them as O $ samples.

Figure 4 .
Figure 4. CCN/NDN content dissemination setup.The CP then performs two main encryption processes.(i) CDP selects key pairs, {PPK, PSK} and parameters, θ 0 , θ 1 , θ 2 ∈ R q .He runs the encryption algorithm Enc(PPK, E(CD)), where E(CD) is the encoded CD and set C CD = (C 1 , C 2 ) = (a•θ 0 + θ 1 , pθ 1 + θ 2 + E(CD)).(ii) The CDP runs the encryption algorithm Encryption(PP, M = PSK, AS) → (CT) in Section 4 and the broadcasts (C CD ) and CT to the cloud server.Note that (C CD ) is the encrypted content data CD which CUs are interested and CT is the encrypted content policy which contains some relevant information about the CD and secrete key to or password to decrypt (C CD ).

Figure 5 .
Figure 5. Represents the key exchange protocol.

Table 2 :
Use the lookup function to findTable 2 (id, low, high) and use insert function to map (id, low, high) to w and assign node serial w with attributes id, high, and low.The algorithm references the attributes of serial w in Table 1 with in Table 2 by recalling the BUILD function in Algorithm 1.Let

Table 1 .
Comparing the execution time of some related works (ms)

Table 2 .
Relevant related schemes in terms of their access structures, operations and capacity analysis.