Research Article

Secure and Efficient Communication in VANETs Using Level-Based Access Control

Algorithm 2

Algorithm for indistinguishability experiment .
Input: A security parameter and a random bit
Output: The success of the attack.
(1)Setup parameters:
(2)
(3)
(4)
(5)Phase I: learning
  
(6)Prechallenge:
  If , then
  
(7) else,
   
  end
(8)Phase II: challenging
  
  If and have never been executed, then
(9)If
   , then return 1
   else return 0
  else
   return
  end