Research Article
Secure and Efficient Communication in VANETs Using Level-Based Access Control
Algorithm 3
Algorithm for indistinguishability experiment under CCA attack
. | Input: a security parameter and a random bit | | Output: the success of the attack. | | Setup parameters: the setup process is same with Algorithm 2. | | Phase I: learning | | | | Prechallenge: the prechallenge process is same with Algorithm 2. | (1) | Phase II: challenging | | if | | and | | and | | have never been executed, then | | If , then return 1 | | else return 0 | | else | | return | | end |
|