2013
DOI: 10.1109/tifs.2013.2277471
|View full text |Cite
|
Sign up to set email alerts
|

b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
172
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 241 publications
(172 citation statements)
references
References 20 publications
0
172
0
Order By: Relevance
“…The exclusive-or operations (XOR) and concatenate operations are negligible in the following analysis of computation cost because their execution time is much less than that of a hash to number function operation. 35 scheme consists of two bilinear pairing operations, 2n scalar multiplication operations, n operations of MapToPoint hash function, and n operations of one-way hash function. So the total computation cost of BMV is 2T bp + 2nT b:m + nT H + nT h .…”
Section: Computation Cost Analysis and Comparisonmentioning
confidence: 99%
“…The exclusive-or operations (XOR) and concatenate operations are negligible in the following analysis of computation cost because their execution time is much less than that of a hash to number function operation. 35 scheme consists of two bilinear pairing operations, 2n scalar multiplication operations, n operations of MapToPoint hash function, and n operations of one-way hash function. So the total computation cost of BMV is 2T bp + 2nT b:m + nT H + nT h .…”
Section: Computation Cost Analysis and Comparisonmentioning
confidence: 99%
“…For example, a number of protocols have been proposed for the value added services in Vehicular Ad-hoc Networks (VANET) [12], [13], [14], public-private key-based vehicular communication system [15], [16], [17], and digital signatures in batch to achieve high efficiency [18], [19]. Several SMS-based wireless protocols [20], [21], [22], [23], lightweight AKA [7] and SMS-based attacks and their countermeasures are discussed in [8].…”
Section: Existing Solutionsmentioning
confidence: 99%
“…However, RAISE [12] does not provide mutual authentication and is only partially secure against impersonation attacks. We observe that user privacy is preserved in ABAKA [14] and RAISE [12], but both SPECS [17] and b-SPECS+ [15] suffer from replay attack. Our proposed protocol, on the other hand, fulfills all the mentioned requirements.…”
Section: Ind-cpamentioning
confidence: 99%
“…Zaverucha et al [8] presented and compared some group testing algorithms for finding invalid signatures. Zhang et al [10] adopted the group testing technique to find invalid signatures in a batch in mobile networks. Lee et al [9] proposed a secure batch verification with group testing to improve the real-time performance of mobile networks.…”
Section: IImentioning
confidence: 99%