K. Ren, W. Lou, Kwangjo Kim, R. Deng (2006)
A novel privacy preserving authentication and access control scheme for pervasive computing environmentsIEEE Transactions on Vehicular Technology, 55
K. Sampigethaya, Leping Huang, Mingyan Li, R. Poovendran, Kanta Matsuura, K. Sezaki (2005)
CARAVAN: Providing Location Privacy for VANET
Fangguo Zhang, R. Safavi-Naini, W. Susilo (2003)
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings
V. Miller (1985)
Use of Elliptic Curves in Cryptography
J. Misener (2005)
VEHICLE-INFRASTRUCTURE INTEGRATION (VII) AND SAFETY: RUBBER AND RADIO MEETS THE ROAD IN CALIFORNIA, 11
Gregory Zaverucha, Douglas Stinson (2009)
Group Testing and Batch Verification
D. Boneh, Ben Lynn, H. Shacham (2001)
Short Signatures from the Weil PairingJournal of Cryptology, 17
A. Miyaji, Masaki Nakabayashi, Shunzo Takano (2001)
New Explicit Conditions of Elliptic Curve Traces for FR-ReductionIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 84
Nong Ye, Yebin Zhang, C. Borror (2004)
Robustness of the Markov-chain model for cyber-attack detectionIEEE Transactions on Reliability, 53
D. Boneh, M. Franklin (2001)
Identity-Based Encryption from the Weil PairingSIAM J. Comput., 32
Fei-Yue Wang, Daniel Zeng, Liuqing Yang (2006)
Smart Cars on Smart Roads: An IEEE Intelligent Transportation Systems Society UpdateIEEE Pervasive Computing, 5
U. Lee, Biao Zhou, M. Gerla, Eugenio Magistretti, P. Bellavista, Antonio Corradi (2006)
Mobeyes: smart mobs for urban monitoring with a vehicular sensor networkIEEE Wireless Communications, 13
Zhiwen Yu, Xingshe Zhou, Daqing Zhang, Chung-Yau Chin, Xiaohang Wang, Ji Men (2006)
Supporting Context-Aware Media Recommendations for Smart PhonesIEEE Pervasive Computing, 5
M. Raya, J. Hubaux (2005)
Security Aspects of Inter-Vehicle Communications
(1971)
Extension of the limit theorems of probability theory to a sum of variables connected in a chain
Shibo He, Jiming Chen, Youxian Sun, David Yau, N. Yip (2010)
On Optimal Information Capture by Energy-Constrained Mobile SensorsIEEE Transactions on Vehicular Technology, 59
M. Raya, A. Aziz, J. Hubaux (2006)
Efficient secure aggregation in VANETs
Fangguo Zhang, Kwangjo Kim (2003)
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings
J. Camenisch, S. Hohenberger, Michael Pedersen (2007)
Batch Verification of Short SignaturesJournal of Cryptology, 25
H. Yoon, J. Cheon, Yongdae Kim (2004)
Batch Verifications with ID-Based Signatures
Chenxi Zhang, Xiaodong Lin, R. Lu, P. Ho, Xuemin Shen (2008)
An Efficient Message Authentication Scheme for Vehicular CommunicationsIEEE Transactions on Vehicular Technology, 57
D. Du, F. Hwang (1993)
Combinatorial Group Testing and Its Applications
J. Hubaux, Srdjan Capkun, Jun Luo (2004)
The security and privacy of smart vehiclesIEEE Security & Privacy Magazine, 2
Qing Xu, Tony Mak, J. Ko, R. Sengupta (2004)
Vehicle-to-vehicle safety messaging in DSRC
Nong Ye (2000)
A Markov Chain Model of Temporal Behavior for Anomaly Detection
A. Fiat (1989)
Batch RSAJournal of Cryptology, 10
D. Boneh, Xavier Boyen, H. Shacham (2004)
Short Group Signatures
Jae Cha, J. Cheon (2003)
An Identity-Based Signature from Gap Diffie-Hellman GroupsIACR Cryptol. ePrint Arch., 2002
M. Raya, J. P. Hubaux (2007)
Securing vehicular ad hoc networksJournal of Computer Security, 15
An He, K. Bae, T. Newman, J. Gaeddert, Kyouwoong Kim, R. Menon, L. Morales-Tirado, James Neel, Youping Zhao, J. Reed, W. Tranter (2010)
A Survey of Artificial Intelligence for Cognitive RadiosIEEE Transactions on Vehicular Technology, 59
J. Camenisch, Anna Lysyanskaya (2004)
Signature Schemes and Anonymous Credentials from Bilinear Maps
D. Du, F. K. Hwang (2000)
Combinatorial group testing and its applications, 2nd Edn
D. Eastlake, Paul Jones (2001)
US Secure Hash Algorithm 1 (SHA1)RFC, 3174
Chenxi Zhang, Xiaodong Lin, R. Lu, P. Ho (2008)
RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks2008 IEEE International Conference on Communications
Xiaonan Liu, Zhiyi Fang, Lijun Shi (2007)
Securing Vehicular Ad Hoc Networks2007 2nd International Conference on Pervasive Computing and Applications
Xiaodong Lin, Xiaoting Sun, P. Ho, Xuemin Shen (2007)
GSIS: A Secure and Privacy-Preserving Protocol for Vehicular CommunicationsIEEE Transactions on Vehicular Technology, 56
Chenxi Zhang, R. Lu, Xiaodong Lin, P. Ho, Xuemin Shen (2008)
An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor NetworksIEEE INFOCOM 2008 - The 27th Conference on Computer Communications
Suk-Bok Lee, Joon-Sang Park, M. Gerla, Songwu Lu (2007)
Secure Incentives for Commercial Ad Dissemination in Vehicular NetworksIEEE Transactions on Vehicular Technology, 61
D. Boneh, Craig Gentry, Ben Lynn, H. Shacham (2003)
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
M. Raya, Panos Papadimitratos, J. Hubaux (2006)
SECURING VEHICULAR COMMUNICATIONSIEEE Wireless Communications, 13
M. Raya, J. Hubaux (2005)
The security of vehicular ad hoc networks
X. Yang, Jie Liu, Feng Zhao, N. Vaidya (2004)
A vehicle-to-vehicle communication protocol for cooperative collision warningThe First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004.
Taher Gamal (1984)
A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Trans. Inf. Theory, 31
D. Naccache, David M'Raïhi, S. Vaudenay, D. Raphaeli (1994)
Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard
Kewei Sha, Yong Xi, Weisong Shi, L. Schwiebert, Zhang Tao (2006)
Adaptive Privacy-Preserving Authentication in Vehicular Networks2006 First International Conference on Communications and Networking in China
In this paper, an efficient identity-based batch signature verification scheme is proposed for vehicular communications. With the proposed scheme, vehicles can verify a batch of signatures once instead of in a one-by-one manner. Hence the message verification speed can be tremendously increased. To identify invalid signatures in a batch of signatures, this paper adopts group testing technique, which can find the invalid signatures with few number of batch verifications. In addition, a trust authority in our scheme is capable of tracing a vehicle’s real identity from its pseudo identity, and therefore conditional privacy preserving can also be achieved. Moreover, since identity-based cryptography is employed in the scheme to generate private keys for pseudo identities, certificates are not required and thus transmission overhead can be significantly reduced.
Wireless Networks – Springer Journals
Published: Sep 14, 2011
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.