2022
DOI: 10.1109/jiot.2022.3186921
|View full text |Cite
|
Sign up to set email alerts
|

ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(9 citation statements)
references
References 35 publications
0
9
0
Order By: Relevance
“…And the BPA mainly uses elliptic curve point multiplication operations, elliptic curve point addition operations, modular addition operations, modular multiplication operations, etc. As shown in Table 4, our scheme spends less time in the authentication and re-authentication phases than ZAMA [29] and B-TSCA [32]. Although our scheme spends more time in the registration phase, this phase is generally executed only once before the authentication phase for a vehicle.…”
Section: Computational Costsmentioning
confidence: 96%
See 3 more Smart Citations
“…And the BPA mainly uses elliptic curve point multiplication operations, elliptic curve point addition operations, modular addition operations, modular multiplication operations, etc. As shown in Table 4, our scheme spends less time in the authentication and re-authentication phases than ZAMA [29] and B-TSCA [32]. Although our scheme spends more time in the registration phase, this phase is generally executed only once before the authentication phase for a vehicle.…”
Section: Computational Costsmentioning
confidence: 96%
“…However, the scheme is based on interactive ZKP, which requires multiple interactions between the RSU and the vehicle, and it requires pre-shared secret keys. Ning et al [29] adopted ZKP based on the Fujisaki-Okamoto (FO) Commitment and Elliptic Curve Cryptography (ECC) to achieve vehicle authentication, but in the authentication phase, the authentication server needs to send the relevant information about the vehicle to the TA to verify the identity of the vehicle. Varma et al [30] used ZK-SNARK to authenticate the vehicle, which effectively protects the user privacy of the vehicle.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, weaknesses against vehicles, fog servers, RSU, and Cloud server impersonation attacks have been found [31]. Based on the Zero-knowledge proof (ZKP) and ECC, an innovative anonymous authentication method for IoV has been suggested [32]. The Trusted Authority can track the user's keys, ensuring the violation identification.…”
Section: Related Workmentioning
confidence: 99%