Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4654
Title: Integrating group signature scheme with Non-transitive Proxy Re-encryption in VANET
Authors: Chaudhari, Narendra S.
Keywords: Ad hoc networks;Network security;Vehicle to vehicle communications;Vehicle transmissions;Vehicles;Vehicular ad hoc networks;Cryptographic techniques;Group signature scheme;Group signatures;Inter-vehicular communication;Message transmissions;Non-transitivity;Proxy re encryptions;VANET;Cryptography
Issue Date: 2017
Publisher: Institute of Electrical and Electronics Engineers Inc.
Citation: Kanchan, S., & Chaudhari, N. S. (2017). Integrating group signature scheme with non-transitive proxy re-encryption in VANET. Paper presented at the International Conference on Computing, Analytics and Security Trends, CAST 2016, 227-231. doi:10.1109/CAST.2016.7914971
Abstract: Vehicular Ad hoc Network (VANET), using IEEE 802.11p, forms an ad hoc network of vehicles with no additional infrastructure to provide security and convenience to the drivers. The network delivers the traffic related information to the vehicles commencing the inter-vehicular communication (IVC), considering driver's context awareness and sensitivity. Rather than moving in random fashion as in other ad hoc networks, vehicles move in an organized way. Since all the vehicles on road need to be equipped with message transmission capabilities, the realistic scenario of VANET is often canvassed. Secure routing and smooth operation are even more questionable. This research work aims to enhance security by integrating group signature with Non-transitive Proxy Re-encryption technique. Proxy re-encryption is a cryptographic technique which allows a third party to re-encrypt the message in such a way that it can decrypted by other authorized people as well, along with the person for which the message was originally sent. Non-transitiveness of the algorithm makes sure that proxy is not able to generate re-encryption key, rkA→C given rkA→B and rkB→C. This framework benefits the network in two possible ways: First, the message sent in group can be read by either member of the group or the groups which are allowed to read the message specifically using re-encryption technique. Second, even if the proxy is compromised, C cannot decrypt A's message if the re-encryption rights were given only for B. © 2016 IEEE.
URI: https://doi.org/10.1109/CAST.2016.7914971
https://dspace.iiti.ac.in/handle/123456789/4654
ISBN: 9781509013388
Type of Material: Conference Paper
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: