A Privacy Preserving Communication Scheme for VANETs

2014 ◽  
Vol 556-562 ◽  
pp. 5133-5138 ◽  
Author(s):  
Ying Mei ◽  
Yong Quan Cui ◽  
Guo Zhou Jiang

In this paper, we propose a privacy preserving communication scheme for VANETs, combining ring signature and an identity based encryption. In our scheme, all the messages which needn't keep secret but provide authenticity is signed by employing a ring signature scheme, and it provide good anonymity. And we propose a approach that collecting and disseminating pks by the help of RSU. The vehicle encrypt its pk with the RSU's identity by using a IBE scheme and send it to the nearest RSU, the RSU collect pks and form a ring, and then broadcast it to the vehicles. All vehicles in this ring can sign messages with this the same ring.

2013 ◽  
Vol 32 (5) ◽  
pp. 1385-1387 ◽  
Author(s):  
Hua SUN ◽  
Lei GUO ◽  
Xue-feng ZHENG ◽  
Ai-min WANG

Author(s):  
Chandana Gamage ◽  
Ben Gras ◽  
Bruno Crispo ◽  
Andrew S Tanenbaum

2011 ◽  
Vol 255-260 ◽  
pp. 2192-2196
Author(s):  
Cheng Yu Hu ◽  
Peng Tao Liu

The ring signature can guarantee the signer’s anonymity. Most proposed ring signature schemes have two problems: One is that the size of ring signature depends linearly on the ring size, and the other is that the signer can shift the blame to victims because of the anonymity. Some authors have studied the constant-size ring signature and deniable ring signature to solve these two problems. This paper shows that an identity-based ring signature scheme with constant size has some security problems by using an insecure accumulator and its verification process does not include the message m. Then we combine the concepts of “constant-size” and “deniable” to form an id-based deniable ring signature with constant-size signature. The new scheme with constant-size signature length is proposed based on an improved accumulator from bilinear pairings and it solves the problem of anonymity abuse.


In computer based system, key for the problem of identification, authentication and secrecy can be found in the field of cryptography. Dependence on public key infrastructure and to receive certificates signed by Certificate Authority (CA) to authenticate oneself for exchange of encrypted messages is one of the most significant limitation for the widespread adoption of Public Key Cryptography (PKC) as this process is time engrossing and error prone. Identity based cryptography (IBC) aspires to reduce the certificate and key management overhead of PKC. IBC’s important primordial is Identity-based Encryption (IBE). IBE provided emergent for perception of Identity based signature (IBS) schemes. In this paper, overview of IBE and IBS schemes has been given. Also, a survey on various IBE and IBS schemes has been performed to review different problems related to them. Finally, feasibility and applicability of IBC in current and future environments has been discussed.


2012 ◽  
Vol 35 (9) ◽  
pp. 1874 ◽  
Author(s):  
Ai-Jun GE ◽  
Chuan-Gui MA ◽  
Zhen-Feng ZHANG ◽  
Shao-Zhen CHEN

Sign in / Sign up

Export Citation Format

Share Document