Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms.
Qinglong WangYongYong LiZhiqiang TanNa FanGuDi YaoPublished in: J. Inf. Secur. Appl. (2023)
Keyphrases
- privacy preserving
- authentication scheme
- multi party
- user privacy
- privacy preserving data mining
- smart card
- vertically partitioned data
- secret key
- privacy preservation
- privacy concerns
- private information
- user authentication
- public key
- sensitive information
- horizontally partitioned data
- privacy sensitive
- secure multiparty computation
- security analysis
- data privacy
- data mining
- sensitive data
- authentication protocol
- key management
- information sharing
- privacy protection