2009
DOI: 10.1007/978-3-642-04434-2_4
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Conditional Privacy-Preserving Authentication Protocol in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(19 citation statements)
references
References 11 publications
0
19
0
Order By: Relevance
“…To subtly explain the privacy preserving function in the HO authentication process, we essentially define four levels of user privacy, which is required for achieving anonymity, unlinkability, traceability and non-frameability, respectively, as shown in Table 1 [26]. In this paper, we aim to provide Level 4 Privacy in Table 1.…”
Section: Privacy Preservingmentioning
confidence: 98%
“…To subtly explain the privacy preserving function in the HO authentication process, we essentially define four levels of user privacy, which is required for achieving anonymity, unlinkability, traceability and non-frameability, respectively, as shown in Table 1 [26]. In this paper, we aim to provide Level 4 Privacy in Table 1.…”
Section: Privacy Preservingmentioning
confidence: 98%
“…Recently, Lu et al (2008) proposed an efficient conditional privacy preservation protocol based on group signature scheme for secure vehicular communications. However, Jung et al (2009) pointed out that Lu et al's scheme does not provide unlinkability. Jung et al (2009) proposed a robust conditional privacy-preserving authentication protocol in VANET.…”
Section: Introductionmentioning
confidence: 95%
“…However, Jung et al (2009) pointed out that Lu et al's scheme does not provide unlinkability. Jung et al (2009) proposed a robust conditional privacy-preserving authentication protocol in VANET. Ren et al (Ren et al, 2006;Ren and Lou, 2005) combined blind signature with hash chains to propose new schemes.…”
Section: Introductionmentioning
confidence: 95%
“…The previously reported anonymous authentication schemes in VANETs can mainly be divided into two categories, pseudonymous schemes [1]- [4] and group signature based schemes [5], [6]. However, all of these works have a common limitation on identity revocation.…”
Section: Introductionmentioning
confidence: 99%