Research Article

A Privacy-Preserving Authentication Scheme for VANETs with Exculpability

Table 1

The notations of the execution time of cryptography operations.

NotationsDescription

Two cyclic groups of prime order , denoted as
Two generators of
Three generators of
The private key of the TA
Two integers of
A hash function:
The partial private key of vehicle generated by
The partial private key of vehicle generated by TA
The public key of vehicle
The full-private key of vehicle
The signature of message
The private value of vehicle which is bound to the real identity