Zone Encryption with Anonymous Authentication for V2V Communication.
Jan CamenischManu DrijversAnja LehmannGregory NevenPatrick TowaPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- data encryption
- encryption decryption
- identity authentication
- security analysis
- secure communication
- image authentication
- trusted platform module
- integrity verification
- secret key
- public key cryptography
- network communication
- communication systems
- virtual private network
- mutual authentication
- information exchange
- communication networks
- elliptic curve cryptography
- anonymous communication
- key exchange
- authentication scheme
- user authentication
- information hiding
- data security
- public key