Research Article

Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks

Table 2

Functional and computational comparisons of the proposed approach with existing ABS techniques, i.e., Yu et al.’s algorithm [16], Cui et al.’s algorithm [17], and Xiong et al.’s algorithm [36].

SchemePolicyTraceabilityRevocabilityComputational cost

Yu et al.’s algorithm [16]NoNo
Cui et al.’s algorithm [17]YesYes
Xiong et al.’s algorithm [36]LSSSNoYes
Proposed without batchYesYes
Proposed batch verification

1In this example, we use the number of operations to represent the encryption overhead of IoT devices. denotes the bilinear mapping operation . and represent the exponential operation in group and , respectively, and and stand for the multiplicative operation in and . 2 denotes the size of the whole set of attributes in the system. is the number of attributes involved in an access structure (an access tree or matrix), and stands for the number of users in the ABE systems. denotes the average number of vehicles equipped with an attribute.