International Journal of Computing and Digital Systems ISSN (2210-142X) Int. J. Com. Dig. Sys.13, No.1 (Apr-23) http://dx.doi.org/10.12785/ijcds/130178 A Comprehensive Analysis of Signature Schemes: Towards Pairing and Non-pairing, Taxonomy and Future Scopes Pairing & Non-pairing Security Rajkumar Gaur 1 and Shiva Prakash 2 1 Department of ITCA, MMMUT, Gorakhpur, India 2 Department of ITCA, MMMUT, Gorakhpur, India Received 25 Jun. 2022, Revised 22 Dec. 2022, Accepted 6 Feb. 2023, Published 16 Apr. 2023 Abstract: The notion of a ”Signature scheme” carries possibilities to solve the message and key security problems. A signature scheme aims to secure the channels, IoT nodes, and Blockchain to use public resources and provide high-quality services. The Information and communication system acquires a prominent role in IoT and Blockchain applications. These signature schemes provide trust-free transparency, pseudo-anonymity, equality, motorization, decentralization, and protection. The article contributes a pervasive analysis of the literature pairing, and the non-pairing scheme provides high Security, cost-effectiveness, high service, and several keys for lightweight components. Our proposed approach analyzes the security schemes and differentiates the different security levels. The schemes introduced research contribution and research motivation. Finally, the article presents a well-organized fundamental for future work, segregation analysis of security models and schemes. This article benefits the new researcher with detailed information about signatures and critical security analysis. Keywords: Sign, pairing, non-pairing, schemes, cryptosystem, digital signature 1. INTRODUCTION In the digital system, device-to-device interaction and data transfer from different applications. The communica- tion system used various techniques to reduce costs, time, resources, and human work. However, many intelligent computing systems share information; some information is more critical, and some are sensitive, like government orga- nizations, Banking systems, and defense. So, to secure the data, the cryptography base security methodology is used to prevent the attack and connect the information shared devices. The primary security services are Identity, Authen- tication, and non-repudiation. The pairing and non-pairing base techniques of the cryptosystem provide Security in IoT and Blockchain applications. This paper discusses the various pairing, non-pairing-based signature schemes, and multi-signature schemes. Some security schemes are based on ECC, called the lightweight protocol [1], [2], [3], [4]. These security protocols address the multiple issues of IoT and Blockchain. The IoT and Blockchain applications have a massive amount of information to deploy in edge devices for data processing. Electronic devices require data processing techniques in a large-scale and efficient way. The pairing-based security techniques slow in computation than the non-pairing-based techniques, but the security level is very high. The security mechanism of application devices requires Authentication and Identity to prevent attacks. The other issues are resource constraints, and interoperability [5], [6], [7]. The limited resources of IoT and Blockchain devices have fewer process computations. These funda- mental issues as data transformation and architecture. The emerging paradigm of security systems requires the secure architecture of IoT and Blockchain applications. These are based on cloud, Fog, and Edge computing. This computing platform provides fast data access, less response time, and efficiency for data execution [5]. For the above issues and challenges, the proposed techniques for analyzing the articles are based on the security algorithms and verification techniques to verify the various schemes[8], [9]. This paper provides a comprehensive study of Identity-based signature schemes and presents the techniques to analyze systems with future work. The taxonomy of signature schemes used in IoT-assisted cloud environments is devised from different perspectives: device interoperability, secure network, syn- tactical methods for IoT and Blockchain, semantic systems, and platform interoperability. Furthermore, based on the provided taxonomy, review the primary ID-Based scheme security techniques and solutions to address different at- tacks. The survey ends by providing some open research E-mail address: rajkumargaur@gmail.com, spitca@mmmut.ac.in http:// journals.uob.edu.bh