Table 2.
Notations | Descriptions |
---|---|
BSs | Base Stations |
CA | Certificate Authority |
ECC | Elliptic Curve Cryptography |
a list of pseudo identities | |
list of secret keys | |
a list of the corresponding public keys | |
Zone of ID list | |
A random integer number represents a secret key of vehicle in each zone | |
Finite field of elements in the range . | |
two cyclic additive groups of prime order based on the elliptic curve over the finite field where → | |
Acyclic multiplicative group containing the bilinear pairing result of the two groups . | |
The bilinear pairing function that maps elements from group and group to group | |
Represents the generator point of the group for each zone | |
An ECC point represents the public key of vehicle in each zone: | |
A cryptographic hash function that maps a message to a point in the group | |
Represents the pseudo-identity of to hide it’s real identity and allow vehicle to communicate anonymously | |
Represents message payload transmitted from vehicle | |
Is a timestamp to ensure message freshness | |
The number of base stations | |
The number of zones | |
H(m) | Hashed message to a point over the elliptic curve group |
Generate a signatureover message m using the secret key of each vehicle | |
Represents the concatenation operation of two elements | |
Represents the aggregation of zones generators ( to generate a new value |
|
Represents the aggregation of vehicle secret keys for different zone destinations |
|
Represents the aggregated public key of vehicle where | |
The aggregated signature over message m using the aggregated secret key , where | |
The concatenated signatures that consists of signatures generated by vehicle for different zones destinations: | |
The concatenated public keys that consists of public keys of vehicle for different zones destinations: |