Research Article

An Efficient V2I Authentication Scheme for VANETs

Table 3

Computational costs comparison of the signature and verification phases in theory (ms).

SigningVerification

Wang and Yao [9]
Weng et al. [22]
Zhou et al. [23]
Wan et al. [24]
Zhao et al. [25]
Weng et al. [26]
Chen et al. [27]
Our scheme