2013 Proceedings IEEE INFOCOM 2013
DOI: 10.1109/infcom.2013.6567176
|View full text |Cite
|
Sign up to set email alerts
|

Robust privacy-preserving authentication scheme for communication between electric vehicle as power energy storage and power stations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…However, it has the problem of key escrow in this scheme [12], which proposes a new scheme using the restricted partial blind signature technique under the setting of certificate-free public key. Reference [13] protects the location privacy of charging users by constantly changing their fake identities to ensure that electric vehicles can change different fake identities in different parking lots. A secure electric vehicle payment system was proposed to support two-way anonymous payment while still paying the right fee or getting paid [14].…”
Section: Related Workmentioning
confidence: 99%
“…However, it has the problem of key escrow in this scheme [12], which proposes a new scheme using the restricted partial blind signature technique under the setting of certificate-free public key. Reference [13] protects the location privacy of charging users by constantly changing their fake identities to ensure that electric vehicles can change different fake identities in different parking lots. A secure electric vehicle payment system was proposed to support two-way anonymous payment while still paying the right fee or getting paid [14].…”
Section: Related Workmentioning
confidence: 99%
“…Each charging session of the same EV uses a different pseudonym, and thus an adversary is not able to link different charging sessions of the same EV. The paper [63] proposes a designing privacy-preserving scheme for EVs which act as energy storage. It also introduces a tamper-resistant device attached to an EV.…”
Section: Third-party Anonymitymentioning
confidence: 99%
“…The schemes proposed in the papers [41,31] are both based on ID-based partial restrictive blind signature, which provides unconditional anonymity. Unconditional anonymity guarantees that all transactions are executed privacy-preserving billing and payment blind signature highly anonymous could be used for crimes [41,31] charging unlinkability third party anonymity hardware level security performance extra device and maintenance cost [62,63] group signature cost-effective relatively weaker security performance [49,51] identity privacy ID-based blind signature highly anonymous high communication overhead [41,42,43,44,45,35] third party anonymity hardware level security performance extra device and maintenance cost [62,63] group can protect customers' privacy very well. However, the unconditional anonymity could be utilized for crimes, such as blackmailing and money laundry.…”
Section: Privacy-preserving Billing and Paymentmentioning
confidence: 99%
See 2 more Smart Citations