Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing
Abstract: Edge computing processes data locally instead of in the cloud. Blockchain can secure edge computing data. An edge server’s data storage request should be a blockchain transaction with the data owner’s signature. A blockchain…