Research Article
Certificate-Based Signature Scheme for Industrial Internet of Things Using Hyperelliptic Curve Cryptography
Table 1
Symbols used in the proposed scheme.
| No. | Symbol | Descriptions |
| 1 | | Master secret key of CA which is picked from hyperelliptic curve finite field | 2 | | Master public key of CA which is the combination of and | 3 | | Devisor of hyperelliptic curve | 4 | and | These are two hash functions of a same nature and with same properties | 5 | | It is the selected security parameter from hyperelliptic curve | 6 | | It is a finite number with range of 80 bits | 7 | | It show certificate of sender | 8 | | It show certificate of receiver | 9 | | It show the public key of sender | 10 | | It show the public key of receiver | 11 | | It show the private key of sender | 12 | | It show the private key of receiver | 13 | | It show the identity of sender | 14 | | It show the identity of receiver | 15 | | A symbol used to represent type 1 adversary | 16 | | A symbol used to represent type 2 adversary | 17 | | The symbol of a facilitator for type 1 and type 2 adversaries |
|
|