Zheng et al., 2020 - Google Patents
[Retracted] An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group SignatureZheng et al., 2020
View PDF- Document ID
- 16130961392276185542
- Author
- Zheng Y
- Chen G
- Guo L
- Publication year
- Publication venue
- Complexity
External Links
Snippet
With the change of the network communication environment in vehicular ad hoc networks (VANETs) of a smart city, vehicles may encounter security threats such as eavesdropping, positioning, and tracking, so appropriate anonymity protection is required. Based on the …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang et al. | Delegating authentication to edge: A decentralized authentication architecture for vehicular networks | |
Sutrala et al. | On the design of conditional privacy preserving batch verification-based authentication scheme for internet of vehicles deployment | |
Xu et al. | Efficient certificateless aggregate signature scheme for performing secure routing in VANETs | |
Cui et al. | ARFV: An efficient shared data auditing scheme supporting revocation for fog-assisted vehicular ad-hoc networks | |
He et al. | An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks | |
Feng et al. | P2BA: A privacy-preserving protocol with batch authentication against semi-trusted RSUs in vehicular ad hoc networks | |
Jiang et al. | BAT: A robust signature scheme for vehicular networks using binary authentication tree | |
Qi et al. | A privacy-preserving authentication and pseudonym revocation scheme for VANETs | |
Zhong et al. | Secure and lightweight conditional privacy-preserving authentication for fog-based vehicular ad hoc networks | |
Babu et al. | EV-Auth: Lightweight authentication protocol suite for dynamic charging system of electric vehicles with seamless handover | |
Mishra et al. | A secure and efficient message authentication protocol for VANETs with privacy preservation | |
Zheng et al. | [Retracted] An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature | |
Rajkumar et al. | An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks | |
Tomar et al. | BCAV: Blockchain-based certificateless authentication system for vehicular network | |
Zhang et al. | Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs | |
Yan et al. | A novel scheme of anonymous authentication on trust in pervasive social networking | |
Parameswarath et al. | A privacy-preserving authenticated key exchange protocol for V2G communications using SSI | |
Sudarsono et al. | An anonymous authentication system in wireless networks using verifier-local revocation group signature scheme | |
Ali et al. | Efficient offline/online heterogeneous-aggregated signcryption protocol for edge computing-based internet of vehicles | |
Mu et al. | An identity privacy scheme for blockchain‐based on edge computing | |
Yao et al. | DIDs-assisted secure cross-metaverse authentication scheme for MEC-enabled metaverse | |
Cui et al. | A new certificateless signcryption scheme for securing internet of vehicles in the 5G era | |
Li et al. | A Privacy‐Preserving Authentication Scheme for VANETs with Exculpability | |
Thorncharoensri et al. | Secure and Efficient Communication in VANETs Using Level‐Based Access Control | |
Gao et al. | An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS‐WMNs |