Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
Improving privacy and security in multi-authority attribute-based encryption
Proceedings of the 16th ACM conference on Computer and communications security
A Taxonomy of Pairing-Friendly Elliptic Curves
Journal of Cryptology
On the tradeoff between trust and privacy in wireless ad hoc networks
Proceedings of the third ACM conference on Wireless network security
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Multi-authority attribute based encryption
TCC'07 Proceedings of the 4th conference on Theory of cryptography
On the age of pseudonyms in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Defense against Sybil attack in vehicular ad hoc network based on roadside unit support
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Situation-aware trust architecture for vehicular networks
IEEE Communications Magazine
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Decentralizing attribute-based encryption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Distributed Fine-Grained Access Control in Wireless Sensor Networks
IPDPS '11 Proceedings of the 2011 IEEE International Parallel & Distributed Processing Symposium
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Secure vehicular communication systems: design and architecture
IEEE Communications Magazine
Secure vehicular communication systems: implementation, performance, and research challenges
IEEE Communications Magazine
AMOEBA: Robust Location Privacy Scheme for VANET
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Access control of message is required when certain selected vehicles are granted access to information, instead of all vehicles within communication range. In these situations an access policy (consisting of attributes as road situation and vehicle type) is built into the vehicle and messages are encrypted using these access policies. Only valid vehicles possessing these attributes are able to decrypt the message. Huang and Verma [16] had proposed such an access control framework. The scheme assumed that the road-side units (RSU) are not compromised and had a very restricted access structure. We propose a new access control structure which eliminates the drawbacks of their schemes, by providing access control in presence of compromised RSU. Our technique permits a more general boolean access structure. Communication is possible between two vehicles which are monitored by two RSU, which was not permitted in [16]. The costs are comparable to that of [16].