2018
DOI: 10.3390/app8122546
|View full text |Cite
|
Sign up to set email alerts
|

A More Efficient Conditional Private Preservation Scheme in Vehicular Ad Hoc Networks

Abstract: It is a challenging issue to provide a secure and conditional anonymous authentication scheme in vehicle ad hoc networks (VANETs) with low storage space and computational cost. In 2008, Lu et al. proposed a conditional privacy preservation scheme called efficiency conditional privacy preservation (ECPP) protocol. The ECPP protocol provides conditional privacy preservation to vehicles in VANETs. That is, on one hand vehicles can achieve anonymous authentication in the network, on the other hand, allow to be tra… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 31 publications
0
1
0
Order By: Relevance
“…In [ 41 ], having foreseen the problem of overburdened TA and sought to provide a solution they designed a scheme by using anonymous certificates but this was done at the expense of interactions between the infrastructures. In [ 42 ] et al, privacy protection for VANETs communications was achieved based on the technique of ID-based ring signature, but they failed to provide conditional privacy, since there was no any tracking mechanism in their algorithm [ 43 ]. Many more researchers demonstrated the need to formulate robust schemes in terms of security and privacy protection.…”
Section: Related Work and Limitationsmentioning
confidence: 99%
“…In [ 41 ], having foreseen the problem of overburdened TA and sought to provide a solution they designed a scheme by using anonymous certificates but this was done at the expense of interactions between the infrastructures. In [ 42 ] et al, privacy protection for VANETs communications was achieved based on the technique of ID-based ring signature, but they failed to provide conditional privacy, since there was no any tracking mechanism in their algorithm [ 43 ]. Many more researchers demonstrated the need to formulate robust schemes in terms of security and privacy protection.…”
Section: Related Work and Limitationsmentioning
confidence: 99%