2015
DOI: 10.1109/tifs.2015.2473820
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
554
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 735 publications
(599 citation statements)
references
References 26 publications
0
554
1
Order By: Relevance
“…Islam and Khan proposed a partial public key method [17], where a user registers at the server several times in order to get more than one authentication keys, then the user uses different keys for authentication to achieve anonymity. applied the partial key concept to the vehicular ad hoc networks, and proposed an efficient identity-based privacy preserving authentication scheme, and their scheme enables batch verification of multiple messages [18]. Further, they applied a similar method into public auditing in cloud-based body area networks in [19], by D. He, S. Zeadally, and L. Wu.…”
Section: Related Workmentioning
confidence: 99%
“…Islam and Khan proposed a partial public key method [17], where a user registers at the server several times in order to get more than one authentication keys, then the user uses different keys for authentication to achieve anonymity. applied the partial key concept to the vehicular ad hoc networks, and proposed an efficient identity-based privacy preserving authentication scheme, and their scheme enables batch verification of multiple messages [18]. Further, they applied a similar method into public auditing in cloud-based body area networks in [19], by D. He, S. Zeadally, and L. Wu.…”
Section: Related Workmentioning
confidence: 99%
“…The identity or password is 8-byte long [13]. The sizes of the general hash function's output and timestamp are 20 bytes and 4 bytes, respectively [45]. The random point of ECC-160 is 20 bytes.…”
Section: Communication Performancementioning
confidence: 99%
“…PPAS 15 uses IBS based on bilinear pairings to solve anonymous authentication issues, not only between on-board units (OBUs) but also between the roadside units (RSUs) and OBUs. In addition, to achieve conditional privacy and authentication, He et al 16 design a similar IBS. However, because it is based on the elliptic curve algorithm without bilinear pairing operations, it has less computational overhead and more security.…”
Section: Related Workmentioning
confidence: 99%