2022
DOI: 10.1016/j.sysarc.2021.102387
|View full text |Cite
|
Sign up to set email alerts
|

ID-CEPPA: Identity-based Computationally Efficient Privacy-Preserving Authentication scheme for vehicle-to-vehicle communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
15
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 16 publications
1
15
0
Order By: Relevance
“…However, it is found that the protocol is mainly depended on the advanced encryption standard (AES), which increases the system complexity and limits the ability of VANET to meet its high mobility demands. The proposed protocol in [13] achieves the vehicle anonymity feature without using bilinear pairing processes, but it mainly relies on elliptic curve cryptography (EEC) that has a negative effect on the system implementation.…”
Section: A Existing Schemesmentioning
confidence: 99%
See 4 more Smart Citations
“…However, it is found that the protocol is mainly depended on the advanced encryption standard (AES), which increases the system complexity and limits the ability of VANET to meet its high mobility demands. The proposed protocol in [13] achieves the vehicle anonymity feature without using bilinear pairing processes, but it mainly relies on elliptic curve cryptography (EEC) that has a negative effect on the system implementation.…”
Section: A Existing Schemesmentioning
confidence: 99%
“…More specifically, it is found that the schemes [9], [12], and [14] rely on complex bilinear operations. Despite a fuzzy extractor technique is used to protect biometric templates in the schemes [10] and [11], the elliptic curve cryptography (EEC) adds a complexity in the implementation of the scheme [13]. Although lightweight operations such as the Chebyshev chaotic maps are used in the scheme [15], excessive authentication procedures are performed to accomplish the authentication between the vehicle and the RSU due to the complete reliance on the central TA.…”
Section: A Existing Schemesmentioning
confidence: 99%
See 3 more Smart Citations