Efficient and Reliable Pseudonymous Authentication
نویسندگان
چکیده
Privacy, security, and reliability are key requirements in deploying vehicular ad-hoc networks (VANET). Without those the VANET technology won’t be suitable for market diffusion. In this chapter, the authors are concerned with how to fulfill these requirements by using pseudonym-based authentication, designing security schemes that don’t endanger transport safety while maintaining low overhead. At the same time our design improves the system usability by allowing nodes to self-generate their own pseudonyms.
منابع مشابه
Implementation and adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication
Car-2-Car communication requires the use of pseudonymous public keys to ensure the vehicle’s privacy by making its messages unlinkable over a longer period. The Pseudonymous PKI (PPKI) for Ubiquitous Computing by K. Zeng [Ze06] offers peer-side pseudonym generation, non-repudiation and an efficient revocation mechanism that excludes the revoked peers from the group of authorized participants. I...
متن کاملPseudonymous signatures for eID: efficient and strongly secure dynamic domain-specific pseudonymous signatures
The notion of domain-specific pseudonymous signatures (DSPS) has recently been introduced for the private authentication of ID documents by Bender et al. at the ISC’12 conference. Thanks to this primitive, the ID document, which embeds a chip with computational abilities, is able to authenticate to a service provider through a reader, and the resulting signatures are anonymous, linkable inside ...
متن کاملEfficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
The notion of domain-specific pseudonymous signatures (DSPS) has recently been introduced for private authentication of ID documents, like passports, that embed a chip with computational abilities. Thanks to this privacy-friendly primitive, the document authenticates to a service provider through a reader and the resulting signatures are anonymous, linkable inside the service and unlinkable acr...
متن کاملDomain-Specific Pseudonymous Signatures Revisited
Domain-Specific Pseudonymous Signature schemes were recently proposed for privacy preserving authentication of digital identity documents by the BSI, German Federal Office for Information Security. The crucial property of domain-specific pseudonymous signatures is that a signer may derive unique pseudonyms within a so called domain. Now, the signer’s true identity is hidden behind his domain ps...
متن کاملAn efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016