“…In VANETs, ensuring the confidentiality, validity, and vehicle identity of messages is crucial, and achieving fast authentication in resource-constrained environments is also essential. Due to the fact that the schemes in [19,23,[28][29][30] basically have the above functions, it is more meaningful to compare the proposed schemes with them in the context of vehicle networking. However, based on the scheme in [23], we propose a new scheme that can resist collusion attacks, due to the fact that our scheme and the scheme in [23] have similar communication and computational costs, and we only compare our plan with the scheme in [19,[28][29][30] here.…”