Nothing Special   »   [go: up one dir, main page]

Yang et al., 2022 - Google Patents

A blockchain-based anonymous authentication scheme for Internet of vehicles

Yang et al., 2022

View PDF
Document ID
3485713707872599502
Author
Yang H
Li Y
Publication year
Publication venue
Procedia Computer Science

External Links

Snippet

Anonymous authentication is an important mechanism for providing security and privacy for vehicles in the increasing development of Internet of Vehicles (IoV). Most of the existing authentication mechanisms depend on a central trusted third party to manage large …
Continue reading at www.sciencedirect.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Similar Documents

Publication Publication Date Title
Maria et al. BBAAS: blockchain‐based anonymous authentication scheme for providing secure communication in VANETs
Bayat et al. NERA: A new and efficient RSU based authentication scheme for VANETs
Yang et al. Delegating authentication to edge: A decentralized authentication architecture for vehicular networks
Chattaraj et al. Block-CLAP: Blockchain-assisted certificateless key agreement protocol for internet of vehicles in smart transportation
Xiong et al. Conditional privacy-preserving authentication protocol with dynamic membership updating for VANETs
Horng et al. b-SPECS+: Batch verification for secure pseudonymous authentication in VANET
Eddine et al. EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles
Qi et al. A privacy-preserving authentication and pseudonym revocation scheme for VANETs
CN111372248A (en) Efficient anonymous identity authentication method in Internet of vehicles environment
Wang et al. Hybrid conditional privacy-preserving authentication scheme for VANETs
Sun et al. An efficient distributed key management scheme for group‐signature based anonymous authentication in VANET
Li et al. BDRA: Blockchain and decentralized identifiers assisted secure registration and authentication for VANETs
Xi et al. ZAMA: A ZKP-based anonymous mutual authentication scheme for the IoV
Wang et al. A practical authentication framework for VANETs
Ahamed et al. EMBA: An efficient anonymous mutual and batch authentication schemes for vanets
Malip et al. A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks
Su et al. Blockchain‐based internet of vehicles privacy protection system
Liu et al. HPBS: A hybrid proxy based authentication scheme in VANETs
Liu et al. PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs
He et al. An accountable, privacy-preserving, and efficient authentication framework for wireless access networks
Guo et al. Accountable attribute-based data-sharing scheme based on blockchain for vehicular ad hoc network
Malina et al. Efficient group signatures for privacy-preserving vehicular networks
Yang et al. A blockchain-based anonymous authentication scheme for Internet of vehicles
Choi et al. Secure and efficient protocol for vehicular ad hoc network with privacy preservation
Tomar et al. BCAV: Blockchain-based certificateless authentication system for vehicular network