Research Article
ECLB: Edge-Computing-Based Lightweight Blockchain Framework for Mobile Systems
Table 3
Some major notations used in our ECLB protocol.
| Notations | Description |
| | The -th edge node | | The public and private key pair of | | The number of edge nodes | | The candidate transaction block generated at time | | A signing algorithm | | A signature verification algorithm corresponding to | | ’s signature on , i.e., | | The unspent transaction output (UTXO) set | | The verification result of the candidate block | | An access policy tree | | A public key in the regulator layer | | A master key of the trusted authority in the regulator layer | | A symmetric key | | The ciphertext of | | A symmetric encryption algorithm | | A symmetric decryption algorithm | | The -th transaction record | | The ciphertext of the transaction record |
|
|