Review Article

A Summary of Security Techniques-Based Blockchain in IoV

Table 8

Comparison of computational complexity.

Process of [45]Computational complexityProcess of [44]Computational complexity

Position verificationO (1)VerificationO (sig)
Cross-regional trust stealth zone constructionO (1)Request cooperative signatureO (sig)
Restore key and verify integrityO (Enc)Returns responseO (sig) + O (Enc)