Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
Computer Standards & Interfaces
A novel secure communication scheme in vehicular ad hoc networks
Computer Communications
A scalable routing scheme with group motion support in large and dense wireless ad hoc networks
Computers and Electrical Engineering
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Multi-path routing in Spatial Wireless Ad Hoc networks
Computers and Electrical Engineering
Efficient and multi-level privacy-preserving communication protocol for VANET
Computers and Electrical Engineering
TSVC: timed efficient and secure vehicular communications with privacy preserving
IEEE Transactions on Wireless Communications - Part 1
Hi-index | 0.00 |
Privacy and security issues should be paid more attention before vehicular networks are deployed and applied in practice. This paper introduces an efficient privacy-preserving protocol with confidentiality for Vehicular ad hoc networks (VANETs) based on group signcryption. The proposed protocol featured with the following characteristics: Firstly, it offers conditional anonymous authentication: a message issuer can authenticate itself anonymously on behalf of a group of potential signers while only a trusted authority can reveal the true identity of a message sender. Secondly, it provides confidential: the secrecy of the communication content can be protected. Thirdly, it is efficient: it achieves low storage requirements, fast message verification and cost-effective identity tracking in case of a dispute.