2019
DOI: 10.1002/ett.3708
|View full text |Cite
|
Sign up to set email alerts
|

An efficient certificateless aggregate signature scheme for the Internet of Vehicles

Abstract: In recent years, the research of Internet of vehicles (IoV) has received extensive attention. In IoV, vehicles can make intelligent decisions by exchanging the real‐time traffic information between other vehicles and IoV infrastructures, thereby reducing the probability of traffic jams and accidents. Although IoV has many advantages, it is necessary to ensure that the data are not edited, forged, or disclosed during the transmission. Also, the certificateless signature (CLS) seems to be the solution to this pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(36 citation statements)
references
References 32 publications
0
36
0
Order By: Relevance
“…VANETs [5,9,26]. ere are two major research aspects about the batch verification: one is about the correctness and security of the encryption algorithm and how to aggregate the signatures into one and verify the aggregated one correctly and the other is about the strategy of grouping.…”
Section: Problem Definition Batch Verification Is Widely Used Inmentioning
confidence: 99%
“…VANETs [5,9,26]. ere are two major research aspects about the batch verification: one is about the correctness and security of the encryption algorithm and how to aggregate the signatures into one and verify the aggregated one correctly and the other is about the strategy of grouping.…”
Section: Problem Definition Batch Verification Is Widely Used Inmentioning
confidence: 99%
“…This can reduce the computational overhead on the verifier side and, on the storage side (messages and signatures must be stored), only one signature, not N of them, needs to be stored, thereby reducing memory overhead. The CL-AS scheme was proposed based on a pairing operation, but, recently, pairing-free schemes to reduce the number of operations have been proposed [ 29 , 30 , 31 , 32 , 33 , 34 ]. Figure 2 shows the structure of CL-AS.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Therefore, the security model for CL-AS can be roughly divided into two types of attack model [ 29 , 30 , 31 , 32 , 33 , 34 ]. Each model is of a game by an attacker ( or ) communicating with a challenger to successfully forge a signature.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations