Research Article
NTRU Implementation of Efficient Privacy-Preserving Location-Based Querying in VANET
Table 1
Security parameters for diffident public key cryptosystems.
| Mathematical problem | Integer factorization | Elliptic curve discrete logarithm | Discrete logarithm | Security level | RSA (bits) | ECC (bits) | ElGamal (bits) |
| Low security | 1024 | 160 | 1024 | Moderate security | 2048 | 224 | 2048 | Standard security | 3072 | 256 | 3072 | High security | 7680 | 384 | 7680 | Highest security | 15360 | 512 | 15360 |
|
|