Research Article
A Privacy-Preserving Authentication Scheme for VANETs with Exculpability
Table 1
The notations of the execution time of cryptography operations.
| Notations | Description |
| | Two cyclic groups of prime order , denoted as | | Two generators of | | Three generators of | | The private key of the TA | | Two integers of | | A hash function: | | The partial private key of vehicle generated by | | The partial private key of vehicle generated by TA | | The public key of vehicle | | The full-private key of vehicle | | The signature of message | | The private value of vehicle which is bound to the real identity |
|
|