Research Article

Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption

Table 1

Notations used in the proposed algorithm.

S.NOSymbolDefinition

1Hyperelliptic curve
2Security parameter
3PKGPrivate key generation center
4A large prime number with length equivalents to 80 bits
5A finite field of the order
6, .Hash functions
7Master private key of PKG
8Master public key of PKG
9Public parameter param
10Identity sender
11Identity receiver
12Private key of the sender
13Private key of the receiver
14Public key of the sender
15Public key of receiver
16Ciphertext and plain text
17A fresh nonce
18Encryption and decryption key
19Encryption and decryption through
20Generalized signcryption text for the receiver
21Used for concatenation
22Used for error