2018
DOI: 10.1109/tvt.2018.2839979
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 89 publications
(23 citation statements)
references
References 22 publications
0
23
0
Order By: Relevance
“…Tangade et al [135] propose a Decentralized and Scalable Privacy Preserving Authentication (DSPA) scheme that enjoys the benefits of both asymmetric Identity-Based (IDbased) authentication and the Symmetric Hash Message Authentication Code (HMAC). Indeed, DSPA allows reducing communication and computation overheads.…”
Section: Fast Verification Of Certificates and Signaturesmentioning
confidence: 99%
“…Tangade et al [135] propose a Decentralized and Scalable Privacy Preserving Authentication (DSPA) scheme that enjoys the benefits of both asymmetric Identity-Based (IDbased) authentication and the Symmetric Hash Message Authentication Code (HMAC). Indeed, DSPA allows reducing communication and computation overheads.…”
Section: Fast Verification Of Certificates and Signaturesmentioning
confidence: 99%
“…Such solutions may call for more expensive cryptographic operations, e.g., bilinear pairings [21], which are a building block for group and identity-based signatures. Group signatures, which stay at the core of our proposal, have been also explored by numerous works, e.g., [22][23][24][25][26]. It is commonly recognized that such signatures are beneficial in preserving the anonymity of group members.…”
Section: Related Workmentioning
confidence: 99%
“…For the same reasons, Wasef and Shen [23,24] use batch verification, while their proposal still makes use of bilinear pairings. The work in [26] seems largely based on symmetric cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…Fog computing is used to store the network data and to reutilize it to accelerate network performance. In [26], the authors introduced fog computing to extend cloud computing in the context of the middle fog layer among cloud and mobile devices and produce various benefits. The authors utilized a key sharing mechanism for secure transmissions.…”
Section: Securing Vanets-fog Centric Distributed Architecturementioning
confidence: 99%