Research Article

A2 Chain: A Blockchain-Based Decentralized Authentication Scheme for 5G-Enabled IoT

Algorithm 2

Signature verification (SigVer) algorithm.
Input: message M, Ppub, parameters, ID, and signature (h, S)
Output: verification result—succeed or fail.
(1)Convert the data type of h to an integer, check whether holds, and if it does not, the verification fails;
(2)Convert the data type of S to a point on an elliptic curve, and check whether holds, and if not, the verification fails;
(3)Compute the element in the group GT;
(4)Compute the element in the group GT;
(5)Compute the integer ;
(6)Compute the element in the group G2;
(7)Compute the element in the group GT;
(8)Compute the element in the group GT, converting the data type of ω to a bit string;
(9)Compute the integer , check whether h2 = h is valid, if so the verification passes; otherwise the verification fails.