Research Article

Mix-Context-Based Pseudonym Changing Privacy Preserving Authentication in VANETs

Table 1

Total amount of consumed time.

SchemeExecution time for operation
PairingHashMultiplicationExponentiation

MPCPA(1 + n)tpnth(1 + n)te
GSCP(2 + 3n)tp2nth(n + 5)tm
KPSD(3 + n)tpnth(4 + n)te + 5nts
IBBV3ntp3nth(2n + 5)tm
SABV(2 + 3n)tpnthnte