2018
DOI: 10.1016/j.vehcom.2018.09.003
|View full text |Cite
|
Sign up to set email alerts
|

HCPA-GKA: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
47
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(47 citation statements)
references
References 20 publications
0
47
0
Order By: Relevance
“…The above schemes have made contributions for the security model of VANETs, we will pay much attention to construct lightweight authentication and revocation protocols with verifiable computations [6], [14], [19]. In the same year, some conditional privacypreserving authentication schemes are proposed using hash functions [8], [17]. Compared with the previous work on VANET's privacy-preserving, our work will provide more efficient algorithms by outsourcing computations and present higher security model and the corresponding protocol.…”
Section: Related Workmentioning
confidence: 99%
“…The above schemes have made contributions for the security model of VANETs, we will pay much attention to construct lightweight authentication and revocation protocols with verifiable computations [6], [14], [19]. In the same year, some conditional privacypreserving authentication schemes are proposed using hash functions [8], [17]. Compared with the previous work on VANET's privacy-preserving, our work will provide more efficient algorithms by outsourcing computations and present higher security model and the corresponding protocol.…”
Section: Related Workmentioning
confidence: 99%
“…These attacks prove that the said scheme is vulnerable. Before proceeding with the attack, several security assumptions are made, using [1]- [14], [20], [21], [23]- [27]. Following are the assumptions.…”
Section: Security Weakness and Design Flaws In Xiong Et Al Schemementioning
confidence: 99%
“…In this paper Real-Or-Random Oracle model is used to prove the semantic security of the scheme [9], [20], [21], [34], a design of a security model is very beneficial as it helps us in delivering of robust security goals, the said model has following components which are of interest:…”
Section: Message Meaning Rulementioning
confidence: 99%
“…A group key agreement mechanism based on the Chinese remainder theorem is proposed to distribute the group key for authenticated vehicles in [28]- [31]. The group key can be updated when the vehicle joins and leaves the group.…”
Section: A Related Workmentioning
confidence: 99%