Skip to main content
. 2020 Nov 12;20(22):6471. doi: 10.3390/s20226471
Algorithm 8: Log Verification.
Input: CT,δIoT,PP.
Output: δGW.
  • 1:

    Verify: e(h,Y. xC)e(σCT,g).

  • 2:

    VerifyECDSA(δIoT,σCT).

  • 3:

       if above checks hold, then continue with step 5.

  • 4:

       otherwise, terminate the session.5: Send CT to blockchain server, CT is then stored in cluster storage.

  • 5:

    Compute signature σGW=ECDSA(σCT,σIoT,IPGW,tGW).

  • 6:

    Store δGW=(σGW,IPGW,tGW).