Research Article
Secure and Efficient Communication in VANETs Using Level-Based Access Control
Algorithm 2
Algorithm for indistinguishability experiment
. | Input: A security parameter and a random bit | | Output: The success of the attack. | (1) | Setup parameters: | (2) | | (3) | | (4) | | (5) | Phase I: learning | | (6) | Prechallenge: | If , then | | | (7) | else, | | end | (8) | Phase II: challenging | | If and have never been executed, then | (9) | If | , then return 1 | else return 0 | else | return | end |
|