In a fog computing environment, lots of devices need to be authenticated in order to keep the platform being secured. To solve this\nproblem, we turn to blockchain techniques. Unlike the identification cryptographic scheme based on elliptic curves, the\nproposed 2-adic ring identity authentication scheme inherits the high verification efficiency and high key distribution of\nsequence ciphers of 2-adic ring theory, and this algorithm adds identity hiding function and trading node supervision\nfunction by design. The main designed application scenario of this solution is applicable to the consortium blockchain,\nand the master nodes are mutually trusting cooperative relations. The node transaction verification and block generation\nconsensus algorithm designed in this solution can be implemented in a set of algorithms, which has higher verification\nefficiency and easier to be deployed than other solutions. This scheme can be widely used in the fog computing environment.
Loading....