Table 1 Notations and definitions.

From: Sybil-resistant and privacy-preserving authentication based on short-term pseudonym for internet of vehicles

Notations

Definitions

\(\left( {{G}_{q}},q,G \right)\)

Elliptic curve parameters

\({{H}_{1}},{{H}_{2}},{{H}_{3}},{{H}_{4}},{{H}_{5}},{{H}_{6}}\)

Six secure hash functions

\(\left( {{s}_{TA}},{{S}_{TA}} \right)\)

The private key and public key of TA respectively

\(\left( {{RSU}_{i}} \right)\)

The \(i\)-th RSU

\(RI{{D}_{i}}\)

The identification code of \(RS{{U}_{i}}\)

\(\left( {{r}_{i}},{{R}_{i}} \right)\)

The private key and public key of \(RS{{U}_{i}}\)

\(\Delta t_{R}^{i}\)

The expiration date of \({{R}_{i}}\)

\(RS{{K}_{i}}\)

The secret key of \(RS{{U}_{i}}\)

\(Ve{{h}_{i}}\)

The \(i\)-th vehicle

\(VI{{D}_{i}}\)

The real identification of \(Ve{{h}_{i}}\)

\(Seed_{i}^{1},Seed_{i}^{2}\)

Two random hash seeds generated by TA for \(Ve{{h}_{i}}\)

\(({{v}_{i}},{{V}_{i}},VS{{K}_{i}})\)

The private key, public key and long-term secret key of \(Ve{{h}_{i}}\) respectively

\(\Delta t_{V}^{i}\)

The expiration date of \(Ve{{h}_{i}}\)

\({{SPID}_{i,k}}\)

The k-th short pseudonym of \({{Veh}_{i}}\)

\(\{vp{{r}_{i}}=(v{{a}_{i}},SVS{{K}_{i}}),\) \(VP{{U}_{i}}=(V{{A}_{i}},R{{V}_{i}})\}\)

The short-term private keys and corresponding public keys of \(Ve{{h}_{i}}\) respectively