2010
DOI: 10.1109/tvt.2010.2051468
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications

Abstract: Abstract-In this paper, we propose an efficient pseudonymous authentication scheme with strong privacy preservation, named PASS, for vehicular communications. Unlike traditional pseudonymous authentication schemes, the size of Certificate Revocation List (CRL) in PASS is linear with the number of revoked vehicles and irrelated to how many pseudonymous certificates are held by the revoked vehicles. PASS supports Roadside Unitsaided distributed certificate service that allows the vehicles to update certificates … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
158
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 281 publications
(158 citation statements)
references
References 22 publications
0
158
0
Order By: Relevance
“…Then, the TA calculates its public key pub as pub = and distributes the parameters ( 1 , 2 , , , , pub , ℎ(⋅), (⋅), SEnc(⋅), Δ ) where SEnc(⋅) is a symmetric encryption function and Δ is the expiration threshold of a pseudonymous certificate. As well as the Eiza-Ni-Shi Scheme, the proposed solution also uses PASS (pseudonymous authentication scheme with strong privacy preservation) [8] to anonymously authenticate participating vehicles. Applying the concept proposed in [8], the trusted authority generates a private key SK TA and uses it to issue a set of pseudonymous certificates to those vehicles which expressed their willingness to participate in the video reporting service.…”
Section: Preliminariesmentioning
confidence: 99%
See 4 more Smart Citations
“…Then, the TA calculates its public key pub as pub = and distributes the parameters ( 1 , 2 , , , , pub , ℎ(⋅), (⋅), SEnc(⋅), Δ ) where SEnc(⋅) is a symmetric encryption function and Δ is the expiration threshold of a pseudonymous certificate. As well as the Eiza-Ni-Shi Scheme, the proposed solution also uses PASS (pseudonymous authentication scheme with strong privacy preservation) [8] to anonymously authenticate participating vehicles. Applying the concept proposed in [8], the trusted authority generates a private key SK TA and uses it to issue a set of pseudonymous certificates to those vehicles which expressed their willingness to participate in the video reporting service.…”
Section: Preliminariesmentioning
confidence: 99%
“…As well as the Eiza-Ni-Shi Scheme, the proposed solution also uses PASS (pseudonymous authentication scheme with strong privacy preservation) [8] to anonymously authenticate participating vehicles. Applying the concept proposed in [8], the trusted authority generates a private key SK TA and uses it to issue a set of pseudonymous certificates to those vehicles which expressed their willingness to participate in the video reporting service. The size of each pseudonymous certificate is 66 bytes: 21 bytes for the public key, 20 bytes for pseudo-identity, 4 bytes for the validity period, and 21 bytes for digital signature.…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations