Research Article
A New Certificateless Signcryption Scheme for Securing Internet of Vehicles in the 5G Era
Table 2
Run time of the different encryption operations.
| Symbol | Operation | Parameter | Runtime (ms) |
| | Elliptic curve point multiplication | | 0.341 | | Inverse mode | mod | 0.029 | | Elliptic curve point plus | | 0.002 | | Time required for the bilinear pairing | | 4.669 | | Pairing multiplication operation | | 0.788 | | Pairing addition | | 0.002 | | MapToPoint hash function | | 0.145 | | Modular exponentiation | mod | 1.915 |
|
|