Zone Encryption with Anonymous Authentication for V2V Communication.
Jan CamenischManu DrijversAnja LehmannGregory NevenPatrick TowaPublished in: EuroS&P (2020)
Keyphrases
- identity authentication
- data encryption
- image authentication
- encryption decryption
- secure communication
- network communication
- integrity verification
- security analysis
- public key cryptography
- communication networks
- elliptic curve cryptography
- user authentication
- private key
- virtual private network
- information exchange
- biometric authentication
- high security
- encryption algorithms
- peer to peer
- anonymous communication
- image encryption
- encryption algorithm
- security mechanisms
- encryption scheme
- secret key
- public key
- communication systems
- information sharing