2014
DOI: 10.48550/arxiv.1410.1639
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

An Anonymous Communication Scheme based on Ring Signature in VANETs

Yichen Jiang,
Yi Ji,
Tianhua Liu

Abstract: Vehicular ad hoc networks allow vehicles to connect themselves as networks so that cars could communicate with each other. This paper introduces an anonymous communication scheme providing integrity protection, multi-level privacy and auditability. The scheme is based on a certificateless ring signature proposed in this paper, which is contributed to reduce the length of the signature and simplify the key management. In our scheme, vehicles can compose the anonymous group without the help of road-side infrastr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…To illustrate the computation cost of our scheme clearly, we provide the real-world benchmark in CHARM of different operations in three types of elliptic curves as shown in Table VIII. Furthermore, to present the performance differences, we compare the computation cost of verification of our scheme, and the other two schemes proposed by Zeng et al [13], and the other two schemes proposed by Zeng et al [13], Jiang et al [14] respectively. Zeng et al's scheme is based on symmetric bilinear pairing, while Jiang et al's scheme is based on a normal elliptic curve.…”
Section: A Computation Costmentioning
confidence: 99%
See 2 more Smart Citations
“…To illustrate the computation cost of our scheme clearly, we provide the real-world benchmark in CHARM of different operations in three types of elliptic curves as shown in Table VIII. Furthermore, to present the performance differences, we compare the computation cost of verification of our scheme, and the other two schemes proposed by Zeng et al [13], and the other two schemes proposed by Zeng et al [13], Jiang et al [14] respectively. Zeng et al's scheme is based on symmetric bilinear pairing, while Jiang et al's scheme is based on a normal elliptic curve.…”
Section: A Computation Costmentioning
confidence: 99%
“…Because the approaches in Jiang et al's scheme [14] is based on the ElGamal cryptosystem where the generated signature Jiang et al [14] respectively. Zeng et al's scheme is based on symmetric bilinear pairing, while Jiang et al's scheme is based on a normal elliptic curve.…”
Section: B Communication Costmentioning
confidence: 99%
See 1 more Smart Citation