Research Article
A New Certificateless Signcryption Scheme for Securing Internet of Vehicles in the 5G Era
Table 1
Parameter description table.
| Parameter | Implications |
| | Additive cyclic group of order q | P | Generator of group G | s | System master key | | | | Five safe hash functions | | The identity of roadside unit j, public key , and private key | | Partial private key | | KGC generate the secret value to generate public/private keys | | Secret value of the vehicle | | Secret value for the RSU | | Public key and private key for a vehicle | | List of true vehicle identities | | False identity of a vehicle | | Pseudonym of a vehicle | | Current timestamp of a vehicle | | Ciphertext between two vehicles | | Encryption key and decryption key | | Vehicle of data sender and vehicle of data receiver | | Type-I and type-II adversaries |
|
|