Research Article

Trusted and Efficient Cross-Domain Access Control System Based on Blockchain

Table 2

Symbols of the system.

SymbolDescription

Collision resistant hash function
Signature algorithm
Symmetric encryption algorithm
Asymmetric encryption algorithm
The device’s DMS’s key pair
The user’s key pair
The device’s key pair
Resource data requested by users