Skip to main content

Advances, Systems and Applications

Table 3 Theoretical performance of the proposed schemes

From: A secure cross-domain authentication scheme based on threshold signature for MEC

Phase

Computation

Communication

Initialization

-

\(\left| G \right| +\left| {{Z}_{p}} \right|\)

Signature authorization

2nE

\(2n\left| G \right|\)

Secret sharing

\(\left( t+2 \right) E\)

\(\left( t+3 \right) \left| G \right|\)

Public key publication

3E

\(3\left| G \right|\)

Authorization update

2E

\(\left( n+1 \right) \left| G \right|\)

Signature

2E

\(\left| G \right| +\left| {{Z}_{p}} \right|\)

Signature verification

\(2P+2E\)

-

Credential generation

-

\(2\left| G \right| +\left| {{Z}_{p}} \right| +\left| m \right|\)

Authentication

\(2P+2E\)

-