2023
DOI: 10.1109/tvt.2022.3204582
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…In terms of combining with blockchain, Liu et al [ 34 ] implemented conditional privacy protection using identity-based group signatures and managed vehicle reputation values using blockchain to identify the reliability of messages. In order to improve the efficiency of blockchain-based conditional privacy protection authentication schemes, Zhou et al [ 35 ] proposed the use of knowledge signatures for identity verification to improve efficiency and eliminate the need for secure channels for key distribution. Yang et al [ 36 ] proposed an access control scheme for partial data privacy in VANETs using function encryption.…”
Section: Related Workmentioning
confidence: 99%
“…In terms of combining with blockchain, Liu et al [ 34 ] implemented conditional privacy protection using identity-based group signatures and managed vehicle reputation values using blockchain to identify the reliability of messages. In order to improve the efficiency of blockchain-based conditional privacy protection authentication schemes, Zhou et al [ 35 ] proposed the use of knowledge signatures for identity verification to improve efficiency and eliminate the need for secure channels for key distribution. Yang et al [ 36 ] proposed an access control scheme for partial data privacy in VANETs using function encryption.…”
Section: Related Workmentioning
confidence: 99%
“…While absolute anonymity safeguards privacy, it can complicate vehicle identity management. Specifically, it can lead to issues such as the propagation of malicious messages without the ability to trace the actual identities of the culprits [9,10]. Therefore, conditional anonymity becomes crucial in vehicle authentication.…”
Section: Introductionmentioning
confidence: 99%
“…These relays act as intermediaries, amplifying and forwarding data, mitigating signal degradation, and reducing the probability of data loss or communication interruptions. Consequently, data rates are substantially improved, enabling IoT networks to support bandwidth-intensive applications and services [17][18][19][20][21]. Moreover, the use of relaying techniques can help reduce the outage probability, ensuring that data transmission remains robust even in challenging environments.…”
Section: Introductionmentioning
confidence: 99%