Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X
نویسندگان
چکیده
منابع مشابه
Anonymous Group Message Authentication Protocol for LTE-based V2X Communications
Correspondence Dongxiao Liu, Department of Electrical and Computer Engineering, University of Waterloo, Waterloo Canada N2L 3G1 Email: [email protected] Cellular technologies, in particular the current long-term evolution (LTE) and future 5G, are suitable for implementing vehicle-to-everything (V2X) services, due to the existing network infrastructure, device-to-device (D2D) communicati...
متن کاملPrivacy Preserving Biometrics-Based and User Centric Authentication Protocol
We propose a privacy preserving biometrics-based authentication protocol by which users can authenticate to different service providers from their own devices without involving identity providers in the transactions. Authentication is performed through a zero-knowledge proof of knowledge protocol which is based on a cryptographic identity token created using the unique, repeatable and revocable...
متن کاملA Privacy-Preserving Biometric Authentication Protocol Revisited
Biometric authentication establishes the identity of an individual based on biometric templates (i.e. fingerprints, retina scans etc.). Although biometric authentication has important advantages and many applications, it also raises serious security and privacy concerns. In this parer, we investigate a privacy-preserving biometric authentication protocol that has been proposed by Bringer et al....
متن کاملCryptanalysis of a Deniable Authentication Protocol based on Bilinear Pairing using Single Sender and Group Sender
The aim of an efficient deniable authentication protocol is to enable a receiver to identify the source of a given message but not to prove the identity of the sender. Lu and Cao [7,10] confirmed that the previous protocols had a common weakness in which any third party can impersonate the intended receiver to verify the signature of the given message, and they proposed a new protocol based on ...
متن کاملConcealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol
We enroll more and more personal pervasive devices because these simplify our everyday lives. In order to verify the identity of these devices we use authentication protocols. Although simple authentication often suffices, users would like to remain anonymous during these authentications. Many privacy-preserving authentication protocols have been proposed that claim security and privacy. Howeve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2021
ISSN: 1424-8220
DOI: 10.3390/s21020665