Research Article
An Efficient Scheme for Industrial Internet of Things Using Certificateless Signature
Table 1
Symbols of the proposed algorithm.
| Symbol | Description |
| AP | Application providers | Idu | Identity of any participating user | | KGC master private key | D | Hyperelliptic curve divisor | | Prime no. with size n = 280 | | KGC master public key | PPK | Partial private key | KGC | Key generation center | | Secret values of data consumers | | Secret values of data owners | | Data user private key | | Data consumer private key | DO | Data owners | DC | Data consumers | | Type I attacker | | Type II attacker | ∥ | Concatenation |
|
|