Schnorr-Based Implicit Certification: Improving the Security and Efficiency of Vehicular Communications

[1]  Daniel J. Bernstein Multi-user Schnorr security, revisited , 2015, IACR Cryptol. ePrint Arch..

[2]  Liqun Chen,et al.  Certificateless Public Key Signature Schemes from Standard Algorithms , 2018, IACR Cryptol. ePrint Arch..

[3]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[4]  Carl Eklund,et al.  National Institute for Standards and Technology , 2009, Encyclopedia of Biometrics.

[5]  Frank Kargl,et al.  Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[6]  Hugo Krawczyk,et al.  Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.

[7]  Yannick Seurin,et al.  On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model , 2012, IACR Cryptol. ePrint Arch..

[8]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[9]  William Whyte,et al.  A Security Credential Management System for V2X Communications , 2018, IEEE Transactions on Intelligent Transportation Systems.

[10]  L. Popa,et al.  Performance Evaluation of Elliptic Curve Libraries on Automotive-Grade Microcontrollers , 2019, ARES.

[11]  Jefferson E. Ricardini,et al.  The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications , 2018, 2018 IEEE Vehicular Networking Conference (VNC).

[12]  Robert Lambert,et al.  Accelerating V2X Cryptography through Batch Operations , 2019, IACR Cryptol. ePrint Arch..

[13]  Zhe Liu,et al.  Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes , 2016, IEEE Transactions on Information Forensics and Security.

[14]  Kristin E. Lauter,et al.  The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences , 2008, Selected Areas in Cryptography.

[15]  Hugo Krawczyk,et al.  SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols , 2003, CRYPTO.

[16]  Diego F. Aranha,et al.  Curve25519 for the Cortex-M4 and Beyond , 2017, LATINCRYPT.

[17]  Scott A. Vanstone,et al.  Postal Revenue Collection in the Digital Age , 2000, Financial Cryptography.

[18]  Scott A. Vanstone,et al.  Security of ECQV-Certified ECDSA Against Passive Adversaries , 2009, IACR Cryptol. ePrint Arch..

[19]  Tyler Poling,et al.  National Security Credential Management System (SCMS) Deployment Support: SCMS Baseline Summary Report , 2018 .

[20]  Marcos A. Simplício,et al.  Lightweight and escrow-less authenticated key agreement for the internet of things , 2017, Comput. Commun..