Skip to main content
. 2020 Nov 12;20(22):6471. doi: 10.3390/s20226471
Algorithm7: Log signcryption.
Input: BF,PP,M.
Output: CT,δIoT.
  • 1:

    Set LSSS matrix me by BF.

  • 2:

    Randomly generate rjRZq( j x).

  • 3:

    Generate ve=[satt1att2attj]RZq( j x).

  • 4:

    Use me and ve to compute λe=meve.

  • 5:

    Use s and g to compute C=gs.

  • 6:

    Use B, rj and λe to compute Cj=gβλeQjrj( j x).

  • 7:

    Use rj and g to compute Dj=grj( j x).

  • 8:

    Compute C=MYs.

  • 9:

    Compute h=H(C).

  • 10:

    Compute σCT=hY. xs.

  • 11:

    Perform σIoT=ECDSA(σCT,IPIoT,tIoT).

  • 12:

    Send CT=(σCT ,C,Cj,C,Dj,me,IPIoT,tCT)with(me,ρ(j)) to gateway.

  • 13:

    Store δIoT=(σIoT,IPIoT,tIoT).