Authentication Protocols and Authentication on the Base of PKI and ID-based

被引:0
|
作者
Min Thant [1 ]
Zaw, Than Myo [1 ]
机构
[1] ITMO Univ, St Petersburg, Russia
关键词
Internet of Vehicle (IoV); Authentication protocols; Public key infrastructure and ID-base;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a comprehensive survey of authentication protocols for Internet of Vehicles (IoV) is presented. Specifically Secure cryptographic hash function, Proxy Mobile IP (PMIP), Symmetric polynomials, Search algorithms, Group signature, Merkle hash tree (MHT), Timed Efficient Stream Loss-tolerant Authentication (TESLA), Elliptic Curve Digital Signature Algorithm, Multiplicative secret sharing technique, Identity-based public key cryptosystem, Identity-based aggregate signature, Digital signatures, Anonymous attribute-based group setup scheme and Keyed-hashing for message authentication (HMAC) authentication protocols about explained. In addition, authentication on the base of public key infrastructure and ID-based systems explained with example.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Efficient ID-based deniable authentication protocols
    Shi, Yijuan
    Li, Jianhua
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 321 - 324
  • [2] The Research of Authentication Framework based on PKI and ID-PKI
    Zhu, Youchan
    Zhang, Xiaofang
    ADVANCED RESEARCH ON MECHANICAL ENGINEERING, INDUSTRY AND MANUFACTURING ENGINEERING, PTS 1 AND 2, 2011, 63-64 : 21 - 24
  • [3] Efficient ID-based authentication and key agreement protocols for the session initiation protocol
    Kilinc, Haci Hakan
    Allaberdiyev, Yolguly
    Yanik, Tugrul
    Erdem, Serdar Suer
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2015, 23 (02) : 560 - 579
  • [4] ID-based wireless authentication scheme with anonymity
    Zhu, Hui
    Li, Hui
    Su, Wan-Li
    Wang, Yu-Min
    Tongxin Xuebao/Journal on Communication, 2009, 30 (04): : 130 - 136
  • [6] Improvement of an ID-based deniable authentication protocol
    Lin T.-C.
    Lin, Tzu-Chun (lintc@fcu.edu.tw), 2018, Univ. of Electronic Science and Technology of China (16): : 139 - 144
  • [7] New ID-Based AAA authentication system
    Cho, Young-Bok
    Lee, Sang-Ho
    PROCEEDINGS OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOL 3: ADVANCES IN COMMUNICATIONS, 2007, : 18 - +
  • [8] A new ID-based deniable authentication protocol
    Lu, Rongxing
    Cao, Zhenfu
    Wang, Shengbao
    Bao, Haiyong
    INFORMATICA, 2007, 18 (01) : 67 - 78
  • [9] ID-based Deniable Threshold Ring Authentication
    Jin, Chunhua
    Xu, Chunxiang
    Jiang, Linzhi
    Li, Fagen
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1779 - 1784
  • [10] Improvement of an ID-Based Deniable Authentication Protocol
    Tzu-Chun Lin
    JournalofElectronicScienceandTechnology, 2018, 16 (02) : 139 - 144