Return to Article Details New Attribute-Based Encryption Schemes with Anonymous Authentication and Time Limitation on Fog computing Download Download PDF