Research Article

A Novel Blockchain Identity Authentication Scheme Implemented in Fog Computing

Table 1

Scheme efficiency and safety comparison.

ProgramSignature efficiencyVerification efficiencyForgery attackTransaction information

SM9Satisfy25 KB
CPKC [3]Satisfy15 KB
CSS [13]Satisfy20 KB
2-Adic ring arithmetic authentication schemeSatisfy5 KB-10 KB