2021
DOI: 10.1007/s00779-021-01566-9
|View full text |Cite
|
Sign up to set email alerts
|

Computationally efficient and secure anonymous authentication scheme for cloud users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

2
8

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 31 publications
0
10
0
Order By: Relevance
“…However, most current solutions just guarantee anonymity but neglecting unlinkability. In many authentication schemes [2][3][4] designed for VANETs, the TA serves as the management centre, generating anonymous authentication credentials for vehicles, like anonymous public keys, and also assisting in the completion of vehicles and RSU's registration in its domain. To enable a diverse variety of Internet of vehicle networks, the TA must be dispersed in nature.…”
Section: Introductionmentioning
confidence: 99%
“…However, most current solutions just guarantee anonymity but neglecting unlinkability. In many authentication schemes [2][3][4] designed for VANETs, the TA serves as the management centre, generating anonymous authentication credentials for vehicles, like anonymous public keys, and also assisting in the completion of vehicles and RSU's registration in its domain. To enable a diverse variety of Internet of vehicle networks, the TA must be dispersed in nature.…”
Section: Introductionmentioning
confidence: 99%
“…The anonymity of the end users and security against impersonation attack is achieved in this work. Several authentication schemes based on authentication and key agreement protocol are suggested in the works [ 16 , 17 , 18 ]. These works mainly focus on the unlinkability between the end users and forward secrecy having the main drawback in the reply attack.…”
Section: Related Workmentioning
confidence: 99%
“…At present, a large number of excellent schemes [21][22][23] have emerged in mobile medical, and their security and flexibility have been continuously enriched.…”
Section: Related Workmentioning
confidence: 99%