Table 1.
Notation | Definitions |
---|---|
A trusted authority | |
The j-th RSU | |
The i-th vehicle | |
the private key and public key of TA | |
A certificate of issued by TA | |
The real identity of or | |
The validity period of | |
An internal pseudonym identity of , generated by the TA based on | |
The public pseudonym identity of , generated from of | |
A hash-based message authentication code generated by or the TA | |
A symmetric encryption scheme, where is the key |