Skip to main content
. 2022 Oct 6;22(19):7567. doi: 10.3390/s22197567
Acronym Description Acronym Description
AA Attribute Authority KGC Key Generation Center
AABE Attribute-Based Encryption KP-ABE Key-Policy ABE
ABKS Attribute-Based Encryption with Keyword Search LSTM Long Short-Term Memory
ABS Attribute-Based Signature MAC Message Authentication Code
AES Advanced Encryption Standard MAP Malware Analytic Provider
ASPE Asymmetric PE MANETs Mobile Ad Hoc Networks
CA Certificate Authority MBS Macro Base Station
CAA Central Attribute Authority CCA Chosen Ciphertext Attack
MFCC Mel Frequency Cepstral Coefficients MHSN Mobile Healthcare Social Network
CCA2 Adaptive CCA MiTM Man in The Middle
CNN Convolutional Neural Network ML Machine Learning
CP-ABE Ciphertext-Policy ABE MQTT Message Queue Telemetry Transport
CPA Chosen Plaintext Attack MRPE Multireceiver PE
CSP Cloud Service Provider OPE Order-Preserving Encryption
CSS Cloud Storage Service OSNs Online Social Networks
D2D Device to Device PE Predicate Encryption
DABE Decentralized ABE PIPE Public Index PE
DBDH Decisional Bilinear Diffie–Hellman PEKS Public Key Encryption with Keyword Search
DBE Distance-Based Encryption PKG Public Key Generator
DO Data Owner NTT Number Theoretic Transform
DU Data User RLWE Ring Learning with Errors
DPE Delegate PE PKI Public Key Infrastructure
DRM Digital Rights Management PoV Proof of Vote
ECC Elliptic Curve Cryptography PRES Proxy Re-Encryption with Keyword Search
EHRs Electronic Health Records QoP Quality of Protection
FPGA Field Programmable Gate Array KGAs Keyword Guessing Attacks
GID Global Identity QoS Quality of Service
FE Functional Encryption SDE Searchable Data Encryption
FHE Fully Homomorphic Encryption SDN Software Defined Networking
FVM Functional Virtual Machine SE Searchable Encryption
HABE Hierarchical ABE SSE Symmetric SE
HE Homomorphic Encryption SPE Symmetric PE
IBBE Identity-Based Broadcast Encryption SMC Secure Multi-Party Computation
IBC Identity-Based Cryptography TMN Tactical Mobile Network
IBE Identity-Based Encryption TPE Threshold PE
IBSC Identity-Based Signcryption TTP Trusted Third Party
ICN Information-Centric Networking UAV Unmanned Aerial Vehicle
IoT Internet of Things IPFE Inner Product FE
UMCM User Management and Container Management WSAN Wireless Sensor and Actuator Network
SOK Sakai, Ohgishi and Kasahara ROM Read-Only Memory
MQTT Message Queue Telemetry Transport MBDHE Modified Bilinear Diffie- Hellman Exponent