Research Article
Trusted and Efficient Cross-Domain Access Control System Based on Blockchain
| Symbol | Description |
| | Collision resistant hash function | | Signature algorithm | | Symmetric encryption algorithm | | Asymmetric encryption algorithm | | The device’s DMS’s key pair | | The user’s key pair | | The device’s key pair | | Resource data requested by users |
|
|