Table 1 Meaning of scheme notations

From: An authorizable and preprocessable data transmission scheme based on elliptic curves

Category

Notation

Description

Scheme construction

\(\leftarrow\)

Assignment operation

\(\lambda\)

Security parameter

pqn

Prime numbers

\(F_q\)

Finite field with characteristic q

\(Z_n\)

Integers modulo n

\(Z_n^*\)

Multiplicative group modulo n

ab

Elements in \(F_q\)

\((\mathbb {G},G,p)\)

Cyclic group of order p, with generator G

\((0,1)^*\)

Set of all binary strings

\(\alpha _1,\alpha _2\)

Random integers in \(\mathbb {Z}_n\), used as private keys

rk

Random elements from \(\mathbb {Z}_n^*\)

ij

Index values

msg

Plaintext message

\(\sigma =\left( R,s \right)\)

Signature of msg

\(C=\left( C_1,C_2,C_3 \right)\)

Ciphertext, composed of three components

(PKsk)

Public/private key pair. Among them, PK represents the public key and sk represents the private key.

\((PK^{OneTime},sk^{OneTime})\)

One-time public/private key pair for encryption/decryption

Complexity assumptions

GH

Elements of group

abc

Integers from the set of integers

Security proof

\(\mathcal {A}\)

Adversary in the security model

\(\mathcal {B}\)

Simulator in the security model

\(\mathcal {H}\)

Random oracle

\(\varepsilon\)

Advantage of the adversary

t

Time complexity of the adversary

\(q_s\)

Number of signing queries

\(\iota ,z,w\)

Secret random values selected from \(\mathbb {Z}_p^*\)