Research Article

Blockchain-Based Trust Verification and Streaming Service Awareness for Big Data-Driven 5G and Beyond Vehicle-to-Everything (V2X) Communication

Table 1

Mechanism of encryption and authenticating signatures.

Encrypt the informationAuthenticating signature

Step 1: opt an elliptic curve expressed by with a base point defined by B.
Step 2: define two keys one as private key expressed as such that , where we define here for order of , , for the public key. Subsequently, a public key can be calculated by .
Step 3: further we selected an arbitrary integer number denoted by such that is generated at the calculation .
Step 4: for calculating hash , such that and are the plane values of point .

Step 5: We define signature as . With condition, if one random number and have zero value, then, go to step 3.
However, the process of authenticating signature is given below: step1: when information content is received along with signature , the forward calculations are

Further, step 2 will validate the expression, such that

Step 3: in this step, it is verified whether the identity in equation (6) is satisfied, if yes, then the signatures are valid otherwise a signature is invalid.