| Acronym | Description | Acronym | Description |
| AA | Attribute Authority | KGC | Key Generation Center |
| AABE | Attribute-Based Encryption | KP-ABE | Key-Policy ABE |
| ABKS | Attribute-Based Encryption with Keyword Search | LSTM | Long Short-Term Memory |
| ABS | Attribute-Based Signature | MAC | Message Authentication Code |
| AES | Advanced Encryption Standard | MAP | Malware Analytic Provider |
| ASPE | Asymmetric PE | MANETs | Mobile Ad Hoc Networks |
| CA | Certificate Authority | MBS | Macro Base Station |
| CAA | Central Attribute Authority | CCA | Chosen Ciphertext Attack |
| MFCC | Mel Frequency Cepstral Coefficients | MHSN | Mobile Healthcare Social Network |
| CCA2 | Adaptive CCA | MiTM | Man in The Middle |
| CNN | Convolutional Neural Network | ML | Machine Learning |
| CP-ABE | Ciphertext-Policy ABE | MQTT | Message Queue Telemetry Transport |
| CPA | Chosen Plaintext Attack | MRPE | Multireceiver PE |
| CSP | Cloud Service Provider | OPE | Order-Preserving Encryption |
| CSS | Cloud Storage Service | OSNs | Online Social Networks |
| D2D | Device to Device | PE | Predicate Encryption |
| DABE | Decentralized ABE | PIPE | Public Index PE |
| DBDH | Decisional Bilinear Diffie–Hellman | PEKS | Public Key Encryption with Keyword Search |
| DBE | Distance-Based Encryption | PKG | Public Key Generator |
| DO | Data Owner | NTT | Number Theoretic Transform |
| DU | Data User | RLWE | Ring Learning with Errors |
| DPE | Delegate PE | PKI | Public Key Infrastructure |
| DRM | Digital Rights Management | PoV | Proof of Vote |
| ECC | Elliptic Curve Cryptography | PRES | Proxy Re-Encryption with Keyword Search |
| EHRs | Electronic Health Records | QoP | Quality of Protection |
| FPGA | Field Programmable Gate Array | KGAs | Keyword Guessing Attacks |
| GID | Global Identity | QoS | Quality of Service |
| FE | Functional Encryption | SDE | Searchable Data Encryption |
| FHE | Fully Homomorphic Encryption | SDN | Software Defined Networking |
| FVM | Functional Virtual Machine | SE | Searchable Encryption |
| HABE | Hierarchical ABE | SSE | Symmetric SE |
| HE | Homomorphic Encryption | SPE | Symmetric PE |
| IBBE | Identity-Based Broadcast Encryption | SMC | Secure Multi-Party Computation |
| IBC | Identity-Based Cryptography | TMN | Tactical Mobile Network |
| IBE | Identity-Based Encryption | TPE | Threshold PE |
| IBSC | Identity-Based Signcryption | TTP | Trusted Third Party |
| ICN | Information-Centric Networking | UAV | Unmanned Aerial Vehicle |
| IoT | Internet of Things | IPFE | Inner Product FE |
| UMCM | User Management and Container Management | WSAN | Wireless Sensor and Actuator Network |
| SOK | Sakai, Ohgishi and Kasahara | ROM | Read-Only Memory |
| MQTT | Message Queue Telemetry Transport | MBDHE | Modified Bilinear Diffie- Hellman Exponent |