2020
DOI: 10.1109/tits.2019.2899321
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Group-Based Zero Knowledge Proof-Authentication Protocol in Vehicular Ad Hoc Networks

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 32 publications
(11 citation statements)
references
References 31 publications
0
11
0
Order By: Relevance
“…Malhi et al [23] proposed an efficient privacy-preserving scheme using an aggregated signature verification scheme. Rasheed et al [24] put forward a group-based adaptive zero-knowledge proof authentication protocol that is lightweight and supports users for trade-off selection. Li et al [25] and Coruh et al [26] implemented an authentication scheme for VANETs with a revocation mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…Malhi et al [23] proposed an efficient privacy-preserving scheme using an aggregated signature verification scheme. Rasheed et al [24] put forward a group-based adaptive zero-knowledge proof authentication protocol that is lightweight and supports users for trade-off selection. Li et al [25] and Coruh et al [26] implemented an authentication scheme for VANETs with a revocation mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to the field of digital currency, Ibrahem [41] applied zero-knowledge proofs and homomorphic encryption to an anonymous voting system. Rasheed et al [42] realized an anonymity authentication method based on the premise of protecting user privacy by applying a zero-knowledge proof in the area of Internet of vehicle. Jeong et al [43] applied smart contracts and zero-knowledge proofs in online real estate transactions to provide a transaction process with a privacy protection mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…In references [27][28][29], the authors justified the expediency of using encryption systems with secret keys in the authentication protocol. The purpose of these works is to increase the speed of the prover's authentication.…”
Section: Analysis Of Authentication Protocols Used To Ensure Confidentiality In Vanetmentioning
confidence: 99%