Efficient and Privacy-Preserving Certificate Activation for V2X Pseudonym Certificate Revocation
نویسندگان
چکیده
Vehicle to everything (V2X) technology allows the broader development of driving safety, efficiency, and comfort. Because vehicles can quickly send receive frequent messages from other nearby devices, e.g., cooperative awareness message applications on intelligent transport system (ITS), V2X requires a good security privacy protection make reliable for ITS requirements. The existing standards developed in US Europe use many short valid period pseudonym certificates meet However, this method has difficulty ensuring that revoked are treated as by any because distributing revocation information wireless vehicular network with intermittent rapidly changing topology is demanding. A promising approach solving problem periodic activation released certificates. Initially, it releases all required certain vehicle, be used only after receiving an code. Such activation-code-based schemes have common inefficient resources between road-side unit (RSU) vehicles. This paper proposes efficient privacy-preserving code distribution strategy problem. By adopting unicast model modified certificate (ACPC), our scheme obtain benefits distribution. proposed provides small communication resource usage various channel options delivering codes preserved manner.
منابع مشابه
QuasiModo: Efficient Certificate Validation and Revocation
We present two new schemes for efficient certificate revocation. Our first scheme is a direct improvement on a well-known tree-based variant of the NOVOMODO system of Micali [11]. Our second scheme is a direct improvement on a tree-based variant of a multi-certificate revocation system by Aiello, Lodha, and Ostrovsky [1]. At the core of our schemes is a novel construct termed a QuasiModo tree, ...
متن کاملEfficient Certificate Revocation : A P2P Approach
Certificate revocation is one of the many challenges faced by Public Key Infrastructure (PKI). Certificate revocation is the action of declaring a certificate, which has not expired, is no longer valid due to various reasons ranging from change of relationship between certificate issuer and the public key owner to compromised private keys of the associated certificate to change of information c...
متن کاملWindowed Certificate Revocation
The advent of electronic commerce and personal communications on the Internet heightens concerns over the lack of privacy and security. Network services providing a wide range of security related guarantees are increasingly based on public key certificates. A fundamental problem inhibiting the wide acceptance of existing certificate distribution services is the lack of a scalable certificate re...
متن کاملCertificate Revocation Paradigms
With the extensive development of applications of public key cryptography, the need for supporting infrastructure arose. It became clear that a person can not just use another person’s public key obtained in some way, but he also has to be sure that the key and its claimed owner really belong together and that the connection is not expired. One of the oldest and most widespread ideologies to sa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Sensor and Actuator Networks
سال: 2022
ISSN: ['2224-2708']
DOI: https://doi.org/10.3390/jsan11030051