Research Article
Mix-Context-Based Pseudonym Changing Privacy Preserving Authentication in VANETs
Table 1
Total amount of consumed time.
| Scheme | Execution time for operation | Pairing | Hash | Multiplication | Exponentiation |
| MPCPA | (1 + n)tp | nth | — | (1 + n)te | GSCP | (2 + 3n)tp | 2nth | (n + 5)tm | — | KPSD | (3 + n)tp | nth | — | (4 + n)te + 5nts | IBBV | 3ntp | 3nth | (2n + 5)tm | — | SABV | (2 + 3n)tp | nth | — | nte |
|
|