Research Article
An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs
Table 1
Symbols and descriptions.
| Symbols | Descriptions |
| | Ring ’s identification | | The public/private key of entity | Param | System parameters | | The warrant for the members in ring | | The authorization of proxy signature for | | The session key between and | | Using symmetric key to encrypt message | | Using algorithm ALG and s public key to encrypt message | | Using algorithm ALG to sign message with ’s signing key | | The current timestamp | | Concatenation of messages and |
|
|