“…We take the following cryptographic operations for analysis of the execution cost of the proposed IBS-secPKG system: modular multiplication, bilinear pairing operations, scalar multiplication in ECC, addition in ECC, modular inversion, modular exponentiation, and map-to-point hash function represented as 𝑇 𝑀 , 𝑇 𝐵𝑃 , 𝑇 𝑆𝑀 , 𝑇 𝐴 , 𝑇 𝐼 , 𝑇 𝐸 , and 𝑇 𝐻 respectively. According to the methodology given in [49], [50], we compute the average execution time (in ms) of these operations, summarized in Table 1. In Table 2, we compare the signing and verifying cost of our proposed IBS-secPKG scheme with related schemes such as Karati et al [29], Chen et al [32], Chen et al [33], Sahana et al [36], Shim et al [39], Tseng et al [38], Yang et al [40], Hussain et al [42] and Du et al [43] schemes.…”