Research Article
A Novel Blockchain Identity Authentication Scheme Implemented in Fog Computing
Table 1
Scheme efficiency and safety comparison.
| Program | Signature efficiency | Verification efficiency | Forgery attack | Transaction information |
| SM9 | | | Satisfy | 25 KB | CPKC [3] | | | Satisfy | 15 KB | CSS [13] | | | Satisfy | 20 KB | 2-Adic ring arithmetic authentication scheme | | | Satisfy | 5 KB-10 KB |
|
|