227
Views
14
CrossRef citations to date
0
Altmetric
Information Engineering

A secure lattice-based anonymous authentication scheme for VANETs

, , , &
Pages 66-73 | Received 11 Jun 2017, Accepted 15 Oct 2018, Published online: 29 Jan 2019

References

  • Boneh, D., B. Lynn, and H. Shacham. 2004. “Short Group Signatures.” In Proceedings of Advances in cryptology, Santa Barbara, August 15–19, 41–55. New York: Springer.
  • Cilio, W., M. Linder, and C. Porter. 2013. “Mitigating Power-And Timing-Based Side-Channel Attacks Using Dual-Spacer Dual-Rail Delay-Insensitive Asynchronous Logic.” Microelectronics Journal 44 (3): 258–269. doi:10.1016/j.mejo.2012.12.001.
  • Gentry, C., C. Peikert, and V. Vaikuntanathan. 2008. “Trapdoors for Hard Lattices and New Cryptographic Constructions.” In Proceedings of the fortieth annual ACM symposium on Theory of Computing, Victoria, British Columbia, May 17–20, 197–206. New York: ACM.
  • He, D., S. Zeadally, B. Xu, and X. Huang. 2015. “An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.” IEEE Transactions on Information Forensics and Security 10 (12): 2681–2691. doi:10.1109/TIFS.2015.2473820.
  • Hubaux, J. P., S. Capkun, and J. Luo. 2004. “The Security and Privacy of Smart Vehicles.” IEEE Security Privacy 2 (3): 49–55. doi:10.1109/MSP.2004.26.
  • IEEE (The Institute of Electrical and Electronic Engineering). 2006. IEEE Trial-Use Standard for Wireless Access in Vehicular Environment Security Services for Applications and Management Messages. IEEE standard 1609.2-2006 edition. New York: IEEE Standards Association.
  • Lin, X., X. Sun, P. H. Ho, and X. Shen. 2007. “Gsis: A Secure and Privacy Preserving Protocol for Vehicular Communications.” IEEE Transaction on Vehicular Technology 56 (6): 3442–3456. doi:10.1109/TVT.2007.906878.
  • Liu, J. K., T. H. Yuen, M. H. Au, and W. Susilo. 2014. “Improvements on an Authentication Scheme for Vehicular Sensor Networks.” Expert System with Application 41 (5): 2559–2564. doi:10.1016/j.eswa.2013.10.003.
  • Lu, R., X. Lin, H. Zhu, P. H. Ho, and X. Shen. 2008. “Ecpp: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications.” In Proceedings of IEEE INFOCOM, Phoenix, AZ, May 2, 1903–1911. New York: IEEE.
  • Plossl, K., T. Nowey, and C. Mletzko. 2006. “Towards a Securtiy Architecture for Vehicular Ad Hoc Networks.” In Proceedings of First International Conference on Availability, Reliatility and Security, Vienna, Australia, April 20–22. New York: IEEE.
  • Pointcheval, D., and J. Stern. 2000. “Security Arguments for Digital Signatures and Blind Signatures.” Journal of Cryptology 13 (3): 361–396. doi:10.1007/s001450010003.
  • Ravi, S., A. Raghunathan, and S. Chakradhar. 2004. “Tamper Resistance Mechanisms for Secure Embedded Systems.” In Proceedings of International Conference on VLSID, Mumbai, India, January 9, 605–611. New York: IEEE.
  • Raya, M., and J. P. Hubaux. 2007. “Securing Vehicular Ad Hoc Networks.” Journal of Computer Security 15 (1): 39–68. doi:10.3233/JCS-2007-15103.
  • Raya, M., P. Papadimitratos, and J. P. Hubaux. 2006. “Securing Vehicular Communication.” IEEE Wireless Communication 13 (5): 8–15. doi:10.1109/WC-M.2006.250352.
  • Regev, O. 2006. “Lattice-Based Cryptography.” In Proceedings of the 26th Annual International Conference on Advances in Cryptology, Santa Barbara, California, August 20–24, 131–141. New York: Springer.
  • Shamir, A. 1984. “Identity-Based Cryptosystems and Signature Schemes.” In Proceedings of Advances in cryptology, Santa Barbara, August 19–22, 47–53. New York: Springer.
  • Shim, K. A. 2012. “Cpas: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks.” IEEE Transaction on Vehicular Technology 61 (4): 1874–1883. doi:10.1109/TVT.2012.2186992.
  • Tzeng, S. F., S. J. Horng, T. Li, X. Wang, P. H. Huang, and M. K. Khan. 2017. “Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs.” IEEE Transaction on Vehicular Technology 66 (4): 3235–3248. doi:10.1109/TVT.2015.2406877.
  • Zeadally, S., R. Hunt, Y. S. Chen, A. Irwin, and H. Aamir. 2012. “Vehicular Ad Hoc Networks (Vanets): Status, Results, and Challenge.” Telecommunication Systems 50 (4): 217–241. doi:10.1007/s11235-010-9400-5.
  • Zhang, C., R. Lu, X. Lin, P. O. Ho, and X. Shen. 2008. “An Efficient Identity Based Batch Verification Scheme for Vehicular Sensor Networks.” In Proceedings of IEEE INFOCOM, Phoenix, AZ, May 2, 246–250. New York: IEEE.
  • Zhang, L., Q. Wu, J. Dingo-Ferrer, B. Qin, and C. Hu. 2017. “Distributed Aggregate Privacy-Preserving Authentication in VANETs.” IEEE Transaction on Intelligent Transportation Systems 18 (3): 516–526. doi:10.1109/TITS.2016.2579162.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.