Review Article
A Summary of Security Techniques-Based Blockchain in IoV
Table 8
Comparison of computational complexity.
| Process of [45] | Computational complexity | Process of [44] | Computational complexity |
| Position verification | O (1) | Verification | O (sig) | Cross-regional trust stealth zone construction | O (1) | Request cooperative signature | O (sig) | Restore key and verify integrity | O (Enc) | Returns response | O (sig) + O (Enc) |
|
|