2021 IEEE 21st International Conference on Communication Technology (ICCT) 2021
DOI: 10.1109/icct52962.2021.9658014
|View full text |Cite
|
Sign up to set email alerts
|

LPPA: A Lightweight Privacy-Preserving Authentication Scheme for the Internet of Drones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…Cheng et al [30] proposed a dynamic membership authentication method. However, in their scheme, RSUs and UAVs authenticated each other through a trust authority (TA), and they suffered from a centralization issue.…”
Section: Related Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…Cheng et al [30] proposed a dynamic membership authentication method. However, in their scheme, RSUs and UAVs authenticated each other through a trust authority (TA), and they suffered from a centralization issue.…”
Section: Related Researchmentioning
confidence: 99%
“…The proposed scheme was compared with existing schemes [27], [29], [30] in terms of the computational cost, communication cost, and security features to demonstrate the improved efficiency and security of the proposed scheme. The other related papers do not address authentication between an UAV and a RSU.…”
Section: Performance Analysismentioning
confidence: 99%
“…, l) do (5) if |y ji − 􏼄q/2􏼅| ≥ 􏼄q/4􏼅 then (6) e medical cloud sever will abort it and Return False. ( 7) else (8) Set y ji � 1 up to y jl � 1 (9) end if (10) endfor (11) if y j � (1, 1, . .…”
Section: Trapdoor Querymentioning
confidence: 99%
“…Once the doctor's secret key is compromised, the attacker can trace the trapdoor content previously submitted by the doctor, thereby further infringing on the confidentiality of the outsourced data [10]. In this regard, we optimize the lattice cryptography in our scheme to make the key have relations with period to ensure that the key exposure at the previous period will not affect the medical data confidentiality at the later period and achieve the forward security of the key [11]. Last but not least, the search function of the traditional PEKS scheme is generally delivered to the service party.…”
Section: Introductionmentioning
confidence: 99%
“…Blockchain, proposed by Nakamoto [6] in 2008, is a distributed public ledger that records all transactions into the block without third-party control and ensures the security and fairness of each transaction. At present, the vigorous development of blockchain technology is favoured by many researchers [7][8][9][10][11][12][13][14][15][16]. Wang et al [17] proposed a scheme that uses blockchain technology to store the hash value of users' private data and the attribute set of third-party applications, which realises secure one-to-many transmission of personal data.…”
Section: Introductionmentioning
confidence: 99%