A secure cross-domain authentication scheme based on threshold signature for MEC
Abstract The widespread adoption of fifth-generation mobile networks has spurred the rapid advancement of mobile edge computing (MEC). By decentralizing computing and storage resources to the network edge, MEC significantly enhances real-time data access services and enables efficient processing of...
Main Authors: | Lei Chen, Chong Guo, Bei Gong, Muhammad Waqas, Lihua Deng, Haowen Qin |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2024-03-01
|
Series: | Journal of Cloud Computing: Advances, Systems and Applications |
Subjects: | |
Online Access: | https://doi.org/10.1186/s13677-024-00631-x |
Similar Items
-
Threshold Digital Signature Scheme with Shared Key Based on GOST R 34.10-2001
by: P. O. Dzhunkovskiy, et al.
Published: (2010-09-01) -
Threshold Signature Schemes Application
by: Anastasiya Victorovna Beresneva, et al.
Published: (2015-10-01) -
Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices
by: Anton Leevik, et al.
Published: (2023-07-01) -
Review and Analysis of Cryptographic Schemes Implementing Threshold Signature
by: Anastasiya Victorovna Beresneva, et al.
Published: (2015-03-01) -
E-invoice authenticity verification scheme based on signature verification
by: XIE Rongna, et al.
Published: (2019-12-01)