Research Article
A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications
| 1/G refers to the additive cyclic group, and q denotes the order of group G | | 2, | | 3 | | 4/ | | 5//Registration phase | | 6[Setup]: | | 7 // Generate main system parameters | | 8 //Each domain randomly generates its system parameters | | 9 // Release parameters | | 10[Secret-value-set]: | | 11 | | 12[Partial-private-key-set]: | | 13 | | 14[Private-key-set]: | | 15 | | 16[Public-key-set]: | | 17 | | 18//Execution phase | | 19[Sign]: | | 20 | | 21[Verify]: | | 22 |
|