[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Zheng et al., 2020 - Google Patents

[Retracted] An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature

Zheng et al., 2020

View PDF @Full View
Document ID
16130961392276185542
Author
Zheng Y
Chen G
Guo L
Publication year
Publication venue
Complexity

External Links

Snippet

With the change of the network communication environment in vehicular ad hoc networks (VANETs) of a smart city, vehicles may encounter security threats such as eavesdropping, positioning, and tracking, so appropriate anonymity protection is required. Based on the …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication

Similar Documents

Publication Publication Date Title
Yang et al. Delegating authentication to edge: A decentralized authentication architecture for vehicular networks
Sutrala et al. On the design of conditional privacy preserving batch verification-based authentication scheme for internet of vehicles deployment
Xu et al. Efficient certificateless aggregate signature scheme for performing secure routing in VANETs
Cui et al. ARFV: An efficient shared data auditing scheme supporting revocation for fog-assisted vehicular ad-hoc networks
He et al. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
Feng et al. P2BA: A privacy-preserving protocol with batch authentication against semi-trusted RSUs in vehicular ad hoc networks
Jiang et al. BAT: A robust signature scheme for vehicular networks using binary authentication tree
Qi et al. A privacy-preserving authentication and pseudonym revocation scheme for VANETs
Zhong et al. Secure and lightweight conditional privacy-preserving authentication for fog-based vehicular ad hoc networks
Babu et al. EV-Auth: Lightweight authentication protocol suite for dynamic charging system of electric vehicles with seamless handover
Mishra et al. A secure and efficient message authentication protocol for VANETs with privacy preservation
Zheng et al. [Retracted] An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature
Rajkumar et al. An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks
Tomar et al. BCAV: Blockchain-based certificateless authentication system for vehicular network
Zhang et al. Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs
Yan et al. A novel scheme of anonymous authentication on trust in pervasive social networking
Parameswarath et al. A privacy-preserving authenticated key exchange protocol for V2G communications using SSI
Sudarsono et al. An anonymous authentication system in wireless networks using verifier-local revocation group signature scheme
Ali et al. Efficient offline/online heterogeneous-aggregated signcryption protocol for edge computing-based internet of vehicles
Mu et al. An identity privacy scheme for blockchain‐based on edge computing
Yao et al. DIDs-assisted secure cross-metaverse authentication scheme for MEC-enabled metaverse
Cui et al. A new certificateless signcryption scheme for securing internet of vehicles in the 5G era
Li et al. A Privacy‐Preserving Authentication Scheme for VANETs with Exculpability
Thorncharoensri et al. Secure and Efficient Communication in VANETs Using Level‐Based Access Control
Gao et al. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS‐WMNs