Efficient and Reliable Pseudonymous Authentication

نویسندگان

  • Giorgio Calandriello
  • Antonio Lioy
چکیده

Privacy, security, and reliability are key requirements in deploying vehicular ad-hoc networks (VANET). Without those the VANET technology won’t be suitable for market diffusion. In this chapter, the authors are concerned with how to fulfill these requirements by using pseudonym-based authentication, designing security schemes that don’t endanger transport safety while maintaining low overhead. At the same time our design improves the system usability by allowing nodes to self-generate their own pseudonyms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation and adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication

Car-2-Car communication requires the use of pseudonymous public keys to ensure the vehicle’s privacy by making its messages unlinkable over a longer period. The Pseudonymous PKI (PPKI) for Ubiquitous Computing by K. Zeng [Ze06] offers peer-side pseudonym generation, non-repudiation and an efficient revocation mechanism that excludes the revoked peers from the group of authorized participants. I...

متن کامل

Pseudonymous signatures for eID: efficient and strongly secure dynamic domain-specific pseudonymous signatures

The notion of domain-specific pseudonymous signatures (DSPS) has recently been introduced for the private authentication of ID documents by Bender et al. at the ISC’12 conference. Thanks to this primitive, the ID document, which embeds a chip with computational abilities, is able to authenticate to a service provider through a reader, and the resulting signatures are anonymous, linkable inside ...

متن کامل

Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents

The notion of domain-specific pseudonymous signatures (DSPS) has recently been introduced for private authentication of ID documents, like passports, that embed a chip with computational abilities. Thanks to this privacy-friendly primitive, the document authenticates to a service provider through a reader and the resulting signatures are anonymous, linkable inside the service and unlinkable acr...

متن کامل

Domain-Specific Pseudonymous Signatures Revisited

Domain-Specific Pseudonymous Signature schemes were recently proposed for privacy preserving authentication of digital identity documents by the BSI, German Federal Office for Information Security. The crucial property of domain-specific pseudonymous signatures is that a signer may derive unique pseudonyms within a so called domain. Now, the signer’s true identity is hidden behind his domain ps...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016