메뉴 건너뛰기




Volumn 12, Issue 11, 2013, Pages 5386-5393

Reconstruction of a secure authentication scheme for vehicular ad hoc networks using a binary authentication tree

Author keywords

Digital signature; Identity based cryptography; Privacy preserving authentication scheme; Vehicle to infrastructure communications

Indexed keywords


EID: 84895068441     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2013.100313.120318     Document Type: Article
Times cited : (34)

References (30)
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Proc. Crypto'01, Springer-Verlag
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. Crypto'01, LNCS 2139, Springer-Verlag, pp. 213-229, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Proc. Eurocrypt'03, Springer-Verlag
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps," in Proc. Eurocrypt'03, LNCS 2656, Springer-Verlag, pp. 416-432, 2003.
    • (2003) LNCS , vol.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 4
    • 38049146172 scopus 로고    scopus 로고
    • Batch verification of short signatures
    • Proc. Eurocrypt'07, Springer-Verlag
    • J. Camenisch, S. Hohenberger, and M. Pedersen, "Batch verification of short signatures," in Proc. Eurocrypt'07, LNCS 4514, Springer-Verlag, pp. 246-263, 2007.
    • (2007) LNCS , vol.4514 , pp. 246-263
    • Camenisch, J.1    Hohenberger, S.2    Pedersen, M.3
  • 6
    • 84921021973 scopus 로고
    • Batch RSA
    • Proc. Crypto'89, Springer-Verlag
    • A. Fiat, "Batch RSA," in Proc. Crypto'89, LNCS 435, Springer-Verlag, pp. 175-185, 1989.
    • (1989) LNCS , vol.435 , pp. 175-185
    • Fiat, A.1
  • 8
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Proc. SAC'02, Springer-Verlag
    • F. Hess, "Efficient identity based signature schemes based on pairings," in Proc. SAC'02, LNCS 2595, Springer-Verlag, pp. 310-324, 2003.
    • (2003) LNCS , vol.2595 , pp. 310-324
    • Hess, F.1
  • 9
    • 3042594839 scopus 로고    scopus 로고
    • The security and privacy of smart vehicles
    • J. P. Hubaux, S. Capkun, and J. Luo, "The security and privacy of smart vehicles," IEEE Security and Privacy Mag., vol. 2, no. 3, pp. 49-55, 2004.
    • (2004) IEEE Security and Privacy Mag. , vol.2 , Issue.3 , pp. 49-55
    • Hubaux, J.P.1    Capkun, S.2    Luo, J.3
  • 12
    • 67349168446 scopus 로고    scopus 로고
    • BAT: A robust signature scheme for vehicular networks using binary authentication tree
    • Y. Jiang, M. Shi, and X. S. Shen, "BAT: a robust signature scheme for vehicular networks using binary authentication tree," IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 1974-1983, 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.4 , pp. 1974-1983
    • Jiang, Y.1    Shi, M.2    Shen, X.S.3
  • 14
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacy-preserving protocol for vehicular communications
    • DOI 10.1109/TVT.2007.906878
    • X. Lin, X. Sun, P. H. Ho, and X. Shen, "GSIS: a secure and privacypreserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, 2007. (Pubitemid 350201103)
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.6 I , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 15
    • 34247376546 scopus 로고    scopus 로고
    • Improved security in geographic ad hoc routing through autonomous position verification
    • T. Leinmüller, C. Maiöfer, E. Schoch, and F. Kargl, "Improved security in geographic ad hoc routing through autonomous position verification," 2006 VANET.
    • 2006 VANET
    • Leinmüller, T.1    Maiöfer, C.2    Schoch, E.3    Kargl, F.4
  • 16
    • 44349178856 scopus 로고    scopus 로고
    • Vehicle-infrastructure integration (VII) and satety: Rubber and radio meets the road in california
    • J. A. Misener, "Vehicle-infrastructure integration (VII) and satety: rubber and radio meets the road in california," Intellimotion, vol. 11, no. 2, pp. 1-3, 2005.
    • (2005) Intellimotion , vol.11 , Issue.2 , pp. 1-3
    • Misener, J.A.1
  • 21
    • 84957804123 scopus 로고    scopus 로고
    • Identification of bad signatures in batches
    • Proc. PKC'00, Springer-Verlag
    • J. Pastuszak, D. Michatek, J. Pieprzyk, and J. Seberry, "Identification of bad signatures in batches," in Proc. PKC'00, LNCS 3958, Springer-Verlag, pp. 28-45, 2000.
    • (2000) LNCS , vol.3958 , pp. 28-45
    • Pastuszak, J.1    Michatek, D.2    Pieprzyk, J.3    Seberry, J.4
  • 23
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks," J. Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
    • (2007) J. Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.P.2
  • 24
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Proc. Crypto'84, Springer-Verlag
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. Crypto'84, LNCS 196, Springer-Verlag, pp. 47-53, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 25
    • 77956061255 scopus 로고    scopus 로고
    • An ID-based aggregate signature scheme with constant pairing computations
    • K. A. Shim, "An ID-based aggregate signature scheme with constant pairing computations," J. Systems and Software, vol. 83, no. 10, pp. 1873- 1880, 2010.
    • (2010) J. Systems and Software , vol.83 , Issue.10 , pp. 1873-1880
    • Shim, K.A.1
  • 26
    • 70449565205 scopus 로고    scopus 로고
    • TACKing together efficient authentication, revocation, and privacy in VANETs
    • A. Studer, E. Shi, F. Bai, and A. Perrig, "TACKing together efficient authentication, revocation, and privacy in VANETs," 2009 IEEE SECON Conference.
    • 2009 IEEE SECON Conference
    • Studer, A.1    Shi, E.2    Bai, F.3    Perrig, A.4
  • 27
    • 77955229114 scopus 로고    scopus 로고
    • An identity-based security system for user privacy in vehicular ad hoc networks
    • J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An identity-based security system for user privacy in vehicular ad hoc networks," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 9, pp. 1227-1239, 2010.
    • (2010) IEEE Trans. Parallel Distrib. Syst. , vol.21 , Issue.9 , pp. 1227-1239
    • Sun, J.1    Zhang, C.2    Zhang, Y.3    Fang, Y.4
  • 28
    • 33745171465 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-1
    • Proc. Crypto'05, Springer-Verlag
    • X. Wang, Y. L. Yin, and H. Yu, "Finding collisions in the full SHA-1," in Proc. Crypto'05, LNCS 3621, Springer-Verlag, pp. 17-36, 2005.
    • (2005) LNCS , vol.3621 , pp. 17-36
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 29
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Springer-Verlag
    • X. Wang and H. B. Yu, "How to break MD5 and other hash functions," in Proc. Eurocrypt'05, Springer-Verlag, pp. 19-35, 2005.
    • (2005) Proc. Eurocrypt'05 , pp. 19-35
    • Wang, X.1    Yu, H.B.2
  • 30
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identity-based batch verification scheme for vehicular sensor networks
    • C. Zhang, R. Lu, X. Lin, P. H. Ho, and X. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks," in Proc. 2008 IEEE INFOCOM, pp. 816-824.
    • Proc. 2008 IEEE INFOCOM , pp. 816-824
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.H.4    Shen, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.