Research Article
A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications
1/G refers to the additive cyclic group, and q denotes the order of group G | 2, | 3 | 4/ | 5//Registration phase | 6[Setup]: | 7 // Generate main system parameters | 8 //Each domain randomly generates its system parameters | 9 // Release parameters | 10[Secret-value-set]: | 11 | 12[Partial-private-key-set]: | 13 | 14[Private-key-set]: | 15 | 16[Public-key-set]: | 17 | 18//Execution phase | 19[Sign]: | 20 | 21[Verify]: | 22 |
|