An efficient signcryption scheme for secure communication of VANET

被引:0
作者
School of Computer, Wuhan University, Wuhan [1 ]
Hubei
430072, China
不详 [2 ]
100072, China
不详 [3 ]
Hubei
445000, China
机构
[1] School of Computer, Wuhan University, Wuhan, 430072, Hubei
[2] Science and Technology on Information Assurance Laboratory, Beijing
[3] Hubei Institute for Nationalities, Enshi, 445000, Hubei
来源
Tien Tzu Hsueh Pao | / 3卷 / 512-517期
关键词
Bilinear pairing; Identity-based signcryption; Provable security; Vehicular ad hoc networks;
D O I
10.3969/j.issn.0372-2112.2015.03.015
中图分类号
学科分类号
摘要
According to the characteristics of vehicular networks, this paper presents a identity-based signcryption scheme using the bilinear pairings and proves its security in the random oracle model. The proposed scheme is proved to be secure assuming that the Bilinear Diffie-Hellman problem is hard. Compared with the existing identity based signcryption schemes, the new scheme has lower computation cost and communication overhead. It is suitable for secure communication of vehicular networks. ©, 2015, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:512 / 517
页数:5
相关论文
共 50 条
  • [21] eCLAS: An Efficient Pairing-Free Certificateless Aggregate Signature for Secure VANET Communication
    Han, Yibo
    Song, Wei
    Zhou, Zhangbing
    Wang, Hao
    Yuan, Bo
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1637 - 1648
  • [22] Multi-recipient Signcryption for Secure Group Communication
    Han, Yiliang
    Gui, Xiaolin
    [J]. ICIEA: 2009 4TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-6, 2009, : 161 - +
  • [23] Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things
    Naresh, Vankamamidi Srinivasa
    Reddi, Sivaranjani
    Kumari, Saru
    Allavarpu, V. V. L. Divakar
    Kumar, Sachin
    Yang, Ming-Hour
    [J]. IEEE ACCESS, 2021, 9 : 21267 - 21278
  • [24] An efficient identity based generalized signcryption scheme
    Kushwah, Prashant
    Lal, Sunder
    [J]. THEORETICAL COMPUTER SCIENCE, 2011, 412 (45) : 6382 - 6389
  • [25] A new efficient signcryption scheme in the standard model
    Yang, Zheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (05) : 778 - 789
  • [26] Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
    Chen, Tzung-Her
    Zhu, Ting-Le
    Jeng, Fuh-Gwo
    Wang, Chien-Lung
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [27] A provably secure ID-based mediated signcryption scheme
    Yu, Yong
    Yang, Bo
    Sun, Ying
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 647 - +
  • [28] Efficient short signcryption scheme with public verifiability
    Ma, Changshe
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 118 - 129
  • [29] A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain
    Peng, Xizi
    Zhang, Jinquan
    Zhang, Shibin
    Wan, Wunan
    Chen, Hao
    Xia, Jinyue
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (02): : 265 - 281
  • [30] Certificate-Based Secure Three-Party Signcryption Scheme With Low Costs
    Lin, Han-Yu
    Wu, Tzong-Sun
    Huang, Shih-Kun
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2012, 28 (04) : 739 - 753