Abstract:
The notion of a ”Signature scheme” carries possibilities to solve the message and key security problems. A signature scheme
aims to secure the channels, IoT nodes, and Blockchain to use public resources and provide high-quality services. The Information
and communication system acquires a prominent role in IoT and Blockchain applications. These signature schemes provide trust-free
transparency, pseudo-anonymity, equality, motorization, decentralization, and protection. The article contributes a pervasive survey
on the literature pairing, and the non-pairing scheme provides high Security, cost-effectiveness, high service, and several keys for
lightweight components. Our proposed approach analysis the security schemes and differentiated the different security levels. The
schemes introduced research contribution and research motivation. Finally, the article presents a well-organized fundamental for future
work, segregation analysis of security models and schemes. This article benefits the new researcher with detailed information about
signatures and critical security analysis.