A security credential management system for V2X communications

B Brecht, D Therriault, A Weimerskirch… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
The US Department of Transportation (USDOT) issued a proposed rule on January 12, 2017
to mandate vehicle-to-vehicle safety communications in light vehicles in the US …

Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation

DA Rivas, JM Barceló-Ordinas, MG Zapata… - Journal of Network and …, 2011 - Elsevier
This article is a position paper on the current security issues in Vehicular Ad hoc Networks
(VANETs). VANETs face many interesting research challenges in multiple areas, from …

Short group signatures

D Boneh, X Boyen, H Shacham - Annual international cryptology …, 2004 - Springer
We construct a short group signature scheme. Signatures in our scheme are approximately
the size of a standard RSA signature with the same security. Security of our group signature …

[HTML][HTML] A survey on group signatures and ring signatures: Traceability vs. anonymity

MNS Perera, T Nakamura, M Hashimoto, H Yokoyama… - Cryptography, 2022 - mdpi.com
This survey reviews the two most prominent group-oriented anonymous signature schemes
and analyzes the existing approaches for their problem: balancing anonymity against …

Dynamic accumulators and application to efficient revocation of anonymous credentials

J Camenisch, A Lysyanskaya - … Santa Barbara, California, USA, August 18 …, 2002 - Springer
We introduce the notion of a dynamic accumulator. An accumulator scheme allows one to
hash a large set of inputs into one short value, such that there is a short proof that a given …

GSIS: A secure and privacy-preserving protocol for vehicular communications

X Lin, X Sun, PH Ho, X Shen - IEEE Transactions on vehicular …, 2007 - ieeexplore.ieee.org
In this paper, we first identify some unique design requirements in the aspects of security
and privacy preservation for communications between different communication devices in …

Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions

M Bellare, D Micciancio, B Warinschi - … on the Theory and Applications of …, 2003 - Springer
This paper provides theoretical foundations for the group signature primitive. We introduce
strong, formal definitions for the core requirements of anonymity and traceability. We then …

Group signatures with verifier-local revocation

D Boneh, H Shacham - Proceedings of the 11th ACM conference on …, 2004 - dl.acm.org
Group signatures have recently become important for enabling privacy-preserving
attestation in projects such as Microsoft's ngscb effort (formerly Palladium). Revocation is …

Accumulators from bilinear pairings and applications

L Nguyen - Topics in Cryptology–CT-RSA 2005: The …, 2005 - Springer
We propose a dynamic accumulator scheme from bilinear pairings and use it to construct an
identity-based (ID-based) ring signature scheme with constant-size signatures and to …

Foundations of group signatures: The case of dynamic groups

M Bellare, H Shi, C Zhang - Cryptographers' track at the RSA conference, 2005 - Springer
Recently, a first step toward establishing foundations for group signatures was taken [5], with
a treatment of the case where the group is static. However the bulk of existing practical …