Research Article
Cost-Effective Proxy Signcryption Scheme for Internet of Things
Table 1
Symbols used in the algorithm.
| Notations of algorithm | Descriptions |
| | Divisors of the hyperelliptic curve | | Represents the role of delegator, proxy signcrypter, and unsigncrypter | , , | Private keys of delegator, proxy signcrypter, and unsigncrypter | , , | Public keys of delegator, proxy signcrypter, and unsigncrypter | | Warrant message and message (plain text) | , | Nonce for delegator and proxy signcrypter | , | Encryption and decryption | | Hash functions | | Preshared, computed shared key among proxy signcrypter and unsigncrypter | | Secret and public key for proxy signature generation and verifications |
|
|