空地协同场景下具有隐私保护的高效异构认证方案
刘雪娇,赵祥,夏莹杰,曹天聪

Efficient heterogeneous authentication scheme with privacy protection in air-ground collaboration scenario
Xuejiao LIU,Xiang ZHAO,Yingjie XIA,Tiancong CAO
表 3 各方案初次认证阶段的计算开销
Tab.3 Computational overhead of schemes in initial authentication phase
方案t1t2
车辆无人机总计算无人机
文献[17]$ 2{t}_{{\mathrm{bpm}}}+2{t}_{{\mathrm{h}}}+2{t}_{{\mathrm{bpex}}} $$ 2{t}_{{\mathrm{bp}}}+4{t}_{{\mathrm{h}}}+3{t}_{{\mathrm{bpex}}}+{t}_{{\mathrm{bpm}}}+{t}_{{\mathrm{bpa}}} $$ 2{t}_{{\mathrm{bp}}}+6{t}_{{\mathrm{h}}}+5{t}_{{\mathrm{bpex}}}+3{t}_{{\mathrm{bpm}}}+{t}_{{\mathrm{bpa}}} $$ 2n{t}_{{\mathrm{bp}}}+4{nt}_{{\mathrm{h}}}+3n{t}_{{\mathrm{bpex}}}+n{t}_{{\mathrm{bpm}}} +n{t}_{{\mathrm{bpa}}} $
文献[19]$ 3{t}_{{\mathrm{bpm}}}+2{t}_{{\mathrm{h}}}+{t}_{{\mathrm{bpex}}} $$ 2{t}_{{\mathrm{bp}}}+3{t}_{{\mathrm{h}}}+{t}_{{\mathrm{bpex}}}+{t}_{{\mathrm{bpm}}}+{t}_{{\mathrm{bpa}}} $$ 2{t}_{{\mathrm{bp}}}+3{t}_{{\mathrm{h}}}+{t}_{{\mathrm{bpa}}}+2{t}_{{\mathrm{bpex}}}+3{t}_{{\mathrm{bpm}}} $$ 2n{t}_{{\mathrm{bp}}}+3n{t}_{{\mathrm{h}}}+n{t}_{{\mathrm{bpex}}}+n{t}_{{\mathrm{bpm}}} $
文献[23]$11 {{t}}_{\mathrm{h}}+3{{t}}_{\mathrm{e}\mathrm{c}\mathrm{c}\mathrm{m}} $$ 8{t}_{{\mathrm{h}}}+3{t}_{{\mathrm{eccm}}}+{t}_{{\mathrm{sig}}} $$ 19{t}_{{\mathrm{h}}}+6{t}_{{\mathrm{eccm}}}+{t}_{{\mathrm{sig}}} $$ 8{nt}_{{\mathrm{h}}}+3n{t}_{{\mathrm{eccm}}}+{nt}_{{\mathrm{sig}}} $
文献[24]$ {t}_{{\mathrm{bp}}}+2{t}_{{\mathrm{h}}}+4{t}_{{\mathrm{bpex}}}+{t}_{{\mathrm{bpm}}} $$ {t}_{{\mathrm{bp}}}+2{t}_{{\mathrm{h}}}+2{t}_{{\mathrm{bpex}}}+{t}_{{\mathrm{bpm}}} $$ 2{t}_{{\mathrm{bp}}}+4{t}_{{\mathrm{h}}}+6{t}_{{\mathrm{bpex}}}+2{t}_{{\mathrm{bpm}}} $$ n{t}_{{\mathrm{bp}}}+2n{t}_{{\mathrm{h}}}+2n{t}_{{\mathrm{bpex}}}+n{t}_{{\mathrm{bpm}}} $
本研究$ 6{t}_{{\mathrm{eccm}}}+9{t}_{{\mathrm{h}}}+2{t}_{{\mathrm{ecca}}} $$ 7{t}_{{\mathrm{eccm}}}+10{t}_{{\mathrm{h}}}+3{t}_{{\mathrm{ecca}}} $$ 13{t}_{{\mathrm{eccm}}}+19{t}_{{\mathrm{h}}}+5{t}_{{\mathrm{ecca}}} $$ (5n+2){t}_{{\mathrm{eccm}}}+10n{t}_{{\mathrm{h}}}+3n{t}_{{\mathrm{ecca}}} $