2019
DOI: 10.1016/j.sysarc.2019.101636
|View full text |Cite
|
Sign up to set email alerts
|

A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 106 publications
(48 citation statements)
references
References 18 publications
0
42
0
Order By: Relevance
“…AliNSF et al [3] 2016 Excessive storage consumption Grabis et al [34] 2020 Excessive storage consumption Yang et al [100] 2018 Excessive storage consumption Konsta et al [45] 2021 Excessive storage consumption Ali et al [2] 2019 Excessive storage consumption Eltayieb et al [28] 2020 Excessive storage consumption Qin et al [80] 2021 Excessive storage consumption Chen et al [14] 2017 Excessive storage consumption Data security protection.…”
Section: Target Problem Authors Year Weaknessmentioning
confidence: 99%
See 1 more Smart Citation
“…AliNSF et al [3] 2016 Excessive storage consumption Grabis et al [34] 2020 Excessive storage consumption Yang et al [100] 2018 Excessive storage consumption Konsta et al [45] 2021 Excessive storage consumption Ali et al [2] 2019 Excessive storage consumption Eltayieb et al [28] 2020 Excessive storage consumption Qin et al [80] 2021 Excessive storage consumption Chen et al [14] 2017 Excessive storage consumption Data security protection.…”
Section: Target Problem Authors Year Weaknessmentioning
confidence: 99%
“…Through smart contracts, each node in a data-exchange P2P network makes consensus and endorsements for each other, queries the transaction record and checks the payment bill from its local blockchain peer. Same as [100], there are also some other works [2,28,45,80] that use the storage of data on the blockchain and the use of smart contracts for secure cloud data sharing.…”
Section: Blockchain-assisted Databasesmentioning
confidence: 99%
“…The following Table 2 shows the estimated time required to execute the theoretical calculation of ZK-SNARKs and CL-Signature [34]. Unlike the isomorphic calculation of CL-Signature, ZK-SNAKRs has the advantage of concise verification by performing simple arithmetic circuit operations.…”
Section: ) Anonymity Level 4 5 Based Idmmentioning
confidence: 99%
“…For example, to increase the efficiency of the authentication and handover process, Lai et al proposed SEBGMM, where blockchain is used to share information between vehicles, routers, and control databases [ 17 ]. In [ 18 ], Ali et al use a couple of blockchains to store authorized and unauthorized vehicles information separately. However, to remove the overhead of certificate based system, Ali et al proposed a certificate-less authentication protocol.…”
Section: Previous Workmentioning
confidence: 99%