Blockchain-Based Trust Verification and Streaming Service Awareness for Big Data-Driven 5G and Beyond Vehicle-to-Everything (V2X) Communication
Table 1
Mechanism of encryption and authenticating signatures.
Encrypt the information
Authenticating signature
Step 1: opt an elliptic curve expressed by with a base point defined by B. Step 2: define two keys one as private key expressed as such that , where we define here for order of ,, for the public key. Subsequently, a public key can be calculated by . Step 3: further we selected an arbitrary integer number denoted by such that is generated at the calculation . Step 4: for calculating hash , such that and are the plane values of point .
Step 5: We define signature as . With condition, if one random number and have zero value, then, go to step 3.
However, the process of authenticating signature is given below: step1: when information content is received along with signature , the forward calculations are
Further, step 2 will validate the expression, such that
Step 3: in this step, it is verified whether the identity in equation (6) is satisfied, if yes, then the signatures are valid otherwise a signature is invalid.