Research Article

A Batch Authentication Design to Protect Conditional Privacy in Internet of Vehicles

Table 1

A review of authentication schemes.

SchemePKI/ID-basedECC/bilinear-basedBatch authentication

Raya et al. [12]PKIECCNo
Sun et al. [13]PKIBilinear-basedNo
Jiang et al. [14]ID-basedBilinear-basedYes
Azees et al. [15]ID-basedBilinear-basedYes
Ali et al. [16]ID-basedBilinear-basedYes
Mei et al. [17]ID-basedBilinear-basedYes
Cui et al. [18]ID-basedECCYes
Xie et al. [19]ID-basedECCYes
Gayathri et al. [20]ID-basedECCYes
Sutra et al. [21]ID-basedECCYes
Thumbur et al. [22]ID-basedECCYes