Research Article

Cost-Effective Proxy Signcryption Scheme for Internet of Things

Table 1

Symbols used in the algorithm.

Notations of algorithmDescriptions

Divisors of the hyperelliptic curve
Represents the role of delegator, proxy signcrypter, and unsigncrypter
, , Private keys of delegator, proxy signcrypter, and unsigncrypter
, , Public keys of delegator, proxy signcrypter, and unsigncrypter
Warrant message and message (plain text)
, Nonce for delegator and proxy signcrypter
, Encryption and decryption
Hash functions
Preshared, computed shared key among proxy signcrypter and unsigncrypter
Secret and public key for proxy signature generation and verifications