Research Article
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption
Table 1
Notations used in the proposed algorithm.
| S.NO | Symbol | Definition |
| 1 | | Hyperelliptic curve | 2 | | Security parameter | 3 | PKG | Private key generation center | 4 | | A large prime number with length equivalents to 80 bits | 5 | ℑ | A finite field of the order | 6 | , . | Hash functions | 7 | | Master private key of PKG | 8 | | Master public key of PKG | 9 | | Public parameter param | 10 | | Identity sender | 11 | | Identity receiver | 12 | | Private key of the sender | 13 | | Private key of the receiver | 14 | | Public key of the sender | 15 | | Public key of receiver | 16 | | Ciphertext and plain text | 17 | | A fresh nonce | 18 | | Encryption and decryption key | 19 | | Encryption and decryption through | 20 | | Generalized signcryption text for the receiver | 21 | | Used for concatenation | 22 | ╨ | Used for error |
|
|