Research Article
A Lamus-Based Flight Data Sharing Model on Consortium Blockchain
(i) | Input: The security parameter . | (ii) | Output: The system parameter . | (1) | Run the function, input the security parameter , and get the system parameter and the corresponding trapdoor . | (2) | Samples three cryptographically secure hash functions , . is the parameter of | (3) | Publish system parament . Let be the master public key and the master private key . |
|