Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4654
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:04Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:04Z-
dc.date.issued2017-
dc.identifier.citationKanchan, S., & Chaudhari, N. S. (2017). Integrating group signature scheme with non-transitive proxy re-encryption in VANET. Paper presented at the International Conference on Computing, Analytics and Security Trends, CAST 2016, 227-231. doi:10.1109/CAST.2016.7914971en_US
dc.identifier.isbn9781509013388-
dc.identifier.otherEID(2-s2.0-85019902141)-
dc.identifier.urihttps://doi.org/10.1109/CAST.2016.7914971-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4654-
dc.description.abstractVehicular Ad hoc Network (VANET), using IEEE 802.11p, forms an ad hoc network of vehicles with no additional infrastructure to provide security and convenience to the drivers. The network delivers the traffic related information to the vehicles commencing the inter-vehicular communication (IVC), considering driver's context awareness and sensitivity. Rather than moving in random fashion as in other ad hoc networks, vehicles move in an organized way. Since all the vehicles on road need to be equipped with message transmission capabilities, the realistic scenario of VANET is often canvassed. Secure routing and smooth operation are even more questionable. This research work aims to enhance security by integrating group signature with Non-transitive Proxy Re-encryption technique. Proxy re-encryption is a cryptographic technique which allows a third party to re-encrypt the message in such a way that it can decrypted by other authorized people as well, along with the person for which the message was originally sent. Non-transitiveness of the algorithm makes sure that proxy is not able to generate re-encryption key, rkA→C given rkA→B and rkB→C. This framework benefits the network in two possible ways: First, the message sent in group can be read by either member of the group or the groups which are allowed to read the message specifically using re-encryption technique. Second, even if the proxy is compromised, C cannot decrypt A's message if the re-encryption rights were given only for B. © 2016 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceInternational Conference on Computing, Analytics and Security Trends, CAST 2016en_US
dc.subjectAd hoc networksen_US
dc.subjectNetwork securityen_US
dc.subjectVehicle to vehicle communicationsen_US
dc.subjectVehicle transmissionsen_US
dc.subjectVehiclesen_US
dc.subjectVehicular ad hoc networksen_US
dc.subjectCryptographic techniquesen_US
dc.subjectGroup signature schemeen_US
dc.subjectGroup signaturesen_US
dc.subjectInter-vehicular communicationen_US
dc.subjectMessage transmissionsen_US
dc.subjectNon-transitivityen_US
dc.subjectProxy re encryptionsen_US
dc.subjectVANETen_US
dc.subjectCryptographyen_US
dc.titleIntegrating group signature scheme with Non-transitive Proxy Re-encryption in VANETen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: