Research Article
A Batch Authentication Design to Protect Conditional Privacy in Internet of Vehicles
Table 1
A review of authentication schemes.
| Scheme | PKI/ID-based | ECC/bilinear-based | Batch authentication |
| Raya et al. [12] | PKI | ECC | No | Sun et al. [13] | PKI | Bilinear-based | No | Jiang et al. [14] | ID-based | Bilinear-based | Yes | Azees et al. [15] | ID-based | Bilinear-based | Yes | Ali et al. [16] | ID-based | Bilinear-based | Yes | Mei et al. [17] | ID-based | Bilinear-based | Yes | Cui et al. [18] | ID-based | ECC | Yes | Xie et al. [19] | ID-based | ECC | Yes | Gayathri et al. [20] | ID-based | ECC | Yes | Sutra et al. [21] | ID-based | ECC | Yes | Thumbur et al. [22] | ID-based | ECC | Yes |
|
|