Strong key-insulated secure and energy-aware certificateless authentication scheme for VANETs

Computers & Electrical Engineering - Tập 95 - Trang 107417 - 2021
Minghao Yang1, Jinhao Chen1, Yanan Chen1,2, Rong Ma1, Sachin Kumar3
1School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China
2Department of Basic Course Teaching, Jiangxi University of Science and Technology, Nanchang, China
3Department of Computer Science and Engineering, Ajay Kumar Garg Engineering College, Ghaziabad, India

Tài liệu tham khảo

Zhong, 2019, Privacy-preserving authentication scheme with full aggregation in VANET, Inform Sci, 476, 211, 10.1016/j.ins.2018.10.021 Ali, 2019, Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey, Veh Commun Xiong, 2019, Server-aided attribute-based signature supporting expressive access structures for industrial internet of things, IEEE Trans Ind Inf, 16, 1013, 10.1109/TII.2019.2921516 Xiong, 2020, A novel multiserver authentication scheme using proxy resignature with scalability and strong user anonymity, IEEE Syst J Wu, 2020, An authenticated key exchange protocol for multi-server architecture in 5G networks, IEEE Access, 8, 28096, 10.1109/ACCESS.2020.2969986 Xiong, 2020, Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT, IEEE Internet Things J, 10.1109/JIOT.2020.2999510 Xiong, 2020, Heterogeneous signcryption with equality test for IIoT environment, IEEE Internet Things J Wu, 2019, A provably secure certificateless public key encryption with keyword search, J Chin Inst Eng, 42, 20, 10.1080/02533839.2018.1537807 Wang, 2018, On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags, J Supercomput, 74, 65, 10.1007/s11227-017-2105-8 Xiong, 2012, Efficient and multi-level privacy-preserving communication protocol for VANET, Comput Electr Eng, 38, 573, 10.1016/j.compeleceng.2011.11.009 Yang, 2011, A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature, 2217 Chen, 2019, A secure authentication protocol for internet of vehicles, Ieee Access, 7, 12047, 10.1109/ACCESS.2019.2891105 He, 2015, An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks, IEEE Trans Inf Forensics Secur, 10, 2681, 10.1109/TIFS.2015.2473820 Lo, 2015, An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings, IEEE Trans Intell Transp Syst, 17, 1319, 10.1109/TITS.2015.2502322 Mei, 2020, Efficient certificateless aggregate signature with conditional privacy preservation in IoV, IEEE Syst J ElGamal, 1985, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans Inform Theory, 31, 469, 10.1109/TIT.1985.1057074 Shamir, 1984, Identity-based cryptosystems and signature schemes, 47 Horng, 2015, An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks, Inform Sci, 317, 48, 10.1016/j.ins.2015.04.033 Ming, 2019, Efficient certificateless conditional privacy-preserving authentication scheme in VANETs, Mob Inf Syst, 2019 Zhao, 2019, Privacy-protected certificateless aggregate signature scheme in VANET, 1 Dodis, 2002, Key-insulated public key cryptosystems, 65 Cui, 2018, An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks, Inform Sci, 451, 1 Dodis, 2003, Strong key-insulated signature schemes, 130 Zhou, 2006, Identity based key insulated signature, 226 Wan, 2011, Certificateless strong key-insulated signature, 270 Karati, 2018, Provably secure and lightweight certificateless signature scheme for IIoT environments, IEEE Trans Ind Inf, 14, 3701, 10.1109/TII.2018.2794991 Zhou, 2018, An efficient V2I authentication scheme for VANETs, Mob Inf Syst, 2018 Hanaoka, 2006, Parallel key-insulated public key encryption, 105 Xiong, 2019, Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments, IEEE Syst J Pointcheval, 2000, Security arguments for digital signatures and blind signatures, J Cryptol, 13, 361, 10.1007/s001450010003