Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security.
Shimaa A. Abdel HakeemHyungWon KimPublished in: J. King Saud Univ. Comput. Inf. Sci. (2023)
Keyphrases
- public key cryptography
- reputation management
- key distribution
- key management
- mutual authentication
- provably secure
- virtual private network
- public key
- elliptic curve
- trusted third party
- security model
- security analysis
- private key
- authentication protocol
- security services
- security properties
- secret key
- rfid tags
- social media
- elliptic curve cryptography
- key agreement
- security protocols
- security requirements
- digital signature
- cryptographic protocols
- key exchange
- public key infrastructure
- encryption decryption
- key agreement protocol
- diffie hellman
- reputation systems
- access control
- standard model
- data encryption
- encryption scheme
- authentication scheme
- peer to peer
- blind signature
- high security
- identity authentication
- social web
- secure communication
- smart card
- privacy protection
- signature scheme
- resource constrained
- integrity verification
- third party
- encryption algorithm
- wireless sensor networks
- ad hoc networks
- hash functions
- blind signature scheme
- ciphertext
- social networks
- network management
- security issues