Skip to main content

Advances, Systems and Applications

Table 3 Comparisons of computational overhead

From: A weight-based conditional privacy-preserving authentication scheme in software-defined vehicular network

Scheme

Signature

Single Authentication

Batch Authentication

He et al. [11]

3Tm+3Th

3Tm+2Ta+Th

(n+2)Tm+(3n−1)Ta+2nTh

Li et al. [24] (EPA-CPPA)

1Tm+2Th

4Tm+1Ta+2Th

(2n+2)Tm+(n)Ta+(2n)Th

Li et al. [45]

1Tm+1Th

3Tm+3Ta+2Th

(n+2)Tm+(3n)Ta+(2n)Th

Our scheme

1Tm+2Th

Tm+Ta+2Th

(n)Tm+(n)Ta+(2n)Th