Advances, Systems and Applications
From: A secure cross-domain authentication scheme based on threshold signature for MEC
Symbol | Definition |
---|---|
n | Number of signature nodes |
t | Size of signature threshold |
\((\alpha ,\beta ,\mu )\) | Secret values of the head node |
\({{d}_{i}}\) | Secret split value generated by the header node for the signature node i |
\({{\delta }_{i}}\) | Initial authorization private key of the signature node i |
\(({{\gamma }_{i}},{{z}_{i}})\) | Secret values of the signature node i |
\({{f}_{i}}(j)\) | Secret split value generated by the signature node i for the signature node j |
\({{v}_{i}}\) | Secret shared value of the signature node i |
\({{\Gamma }_{i}}\) | Public key of the signature node i |
PK | Public key of the subdomain |
m | Authentication message |
\(\left( {{\eta }_{i}},{{\sigma }_{i}} \right)\) | Signature |
\((\eta ,\sigma ,\Gamma )\) | Authentication credential |