Advances, Systems and Applications
From: A secure cross-domain authentication scheme based on threshold signature for MEC
Phase | Computation | Communication |
---|---|---|
Initialization | - | \(\left| G \right| +\left| {{Z}_{p}} \right|\) |
Signature authorization | 2nE | \(2n\left| G \right|\) |
Secret sharing | \(\left( t+2 \right) E\) | \(\left( t+3 \right) \left| G \right|\) |
Public key publication | 3E | \(3\left| G \right|\) |
Authorization update | 2E | \(\left( n+1 \right) \left| G \right|\) |
Signature | 2E | \(\left| G \right| +\left| {{Z}_{p}} \right|\) |
Signature verification | \(2P+2E\) | - |
Credential generation | - | \(2\left| G \right| +\left| {{Z}_{p}} \right| +\left| m \right|\) |
Authentication | \(2P+2E\) | - |