2020
DOI: 10.1109/tvt.2020.3008781
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
45
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 61 publications
(45 citation statements)
references
References 38 publications
0
45
0
Order By: Relevance
“…When a vehicle enters the coverage area of a new RSU, it must be re-authenticated to the new RSU, which undoubtedly increases the delay. Ali et al [ 20 ] design an efficient conditional privacy-preserving hybrid signcryption scheme for heterogeneous vehicle communication based on bilinear pairing. The users’ privacy is protected to a certain extent, but the unlinkability cannot be guaranteed.…”
Section: Related Workmentioning
confidence: 99%
“…When a vehicle enters the coverage area of a new RSU, it must be re-authenticated to the new RSU, which undoubtedly increases the delay. Ali et al [ 20 ] design an efficient conditional privacy-preserving hybrid signcryption scheme for heterogeneous vehicle communication based on bilinear pairing. The users’ privacy is protected to a certain extent, but the unlinkability cannot be guaranteed.…”
Section: Related Workmentioning
confidence: 99%
“…Ali et al [ 21 ] proposed to use signcryption in order to increase efficiency by combining signing and encryption into a single step. Additionally, the scheme allowed for batch unsigncryption.…”
Section: Related Workmentioning
confidence: 99%
“…A final category of VANET schemes uses methods that preclude broadcast messaging, such as asymmetric encryption or 1:1 symmetric keys for communication between each vehicle pair. One example is signcryption schemes such as those proposed in Zhou et al [27] and Ali et al [28], which require the public key of the receiver. Schemes using 1:1 symmetric keys include Xiong & Tang [29] and Li et al [30].…”
Section: Related Workmentioning
confidence: 99%