2019
DOI: 10.1002/ett.3812
|View full text |Cite
|
Sign up to set email alerts
|

An efficient certificateless public key encryption with equality test toward Internet of Vehicles

Abstract: With the rapid development of the Internet of Vehicles, a great amount of vehicles are connected to Internet of Vehicles environment. These vehicles can exchange data to each other and upload the data to a cloud server for backup. Since the data contains some sensitive information, it is necessary to encrypt the data before uploading to the cloud server. However, this method severely hampers the utilization of data because of the tremendous difficulty in the search for encrypted data. For addressing the above … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(20 citation statements)
references
References 39 publications
0
20
0
Order By: Relevance
“…Several schemes such as the schemes in References 1, 6, 12‐14, and 18‐23 have been developed to secure data in the IIoT. Most of them are incapable of secure searching over ciphertext data; schemes in References 14 and 20 have high computational cost, schemes in References 4, 6, 9, 12, and 22 are susceptibility to security and privacy related attacks, scheme in Reference 19 has high communication overhead, and schemes in References 1, 21, and 23 are user‐specific.…”
Section: Related Workmentioning
confidence: 99%
“…Several schemes such as the schemes in References 1, 6, 12‐14, and 18‐23 have been developed to secure data in the IIoT. Most of them are incapable of secure searching over ciphertext data; schemes in References 14 and 20 have high computational cost, schemes in References 4, 6, 9, 12, and 22 are susceptibility to security and privacy related attacks, scheme in Reference 19 has high communication overhead, and schemes in References 1, 21, and 23 are user‐specific.…”
Section: Related Workmentioning
confidence: 99%
“…However, in these schemes, the encryption is conducted under the identical public-key, making it inconvenient for MSNs environments. 21 Due to this limitation, the issuing of PKE was later addressed by Yang et al 17 They introduced a PKE-ET scheme where the equivalence check can be performed directly between two different ciphertexts as well as ciphertexts under the same public key. However, Yang et al's scheme allows users to proceed with the equivalence test on any ciphertexts.…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, these schemes suffered from the complexities of the certificate management because it constructed under the traditional Public-Key Infrastructure (PKI). 21 F I G U R E 1 A typical scenario for mobile social networking applications • The simulation experiment shows that the suggested AET-IBC scheme outperforms other similar schemes. Therefore, it is concluded to be convenient for the MSNs.…”
Section: Introductionmentioning
confidence: 98%
“…It guarantees efficient traffic management 9 and road safety. 10 It assists in the tracking the location of vehicle, 11 identification of high-speed multiple vehicles, distant vehicle identification, data dissemination between vehicles, [12][13][14] and intelligent parking. 15 As everything comes with pros and cons, thus security in RFID based vehicular systems is a major concern as it involves the loss of lives.…”
Section: Introductionmentioning
confidence: 99%
“…20 Different keys, that is, public and private keys are required in asymmetric key cryptography for encryption and decryption of messages. 12,21 However, symmetric key algorithms in contrary uses the same cryptographic key for encrypting the plaintext and decrypting the ciphertext.…”
Section: Introductionmentioning
confidence: 99%