A Lightweight Proxy Signature Scheme for Resource-Constrained NDN-Based Internet of Vehicles
Named Data Networking (NDN) is considered a future architecture for content distribution in the Internet of Vehicles (IoV). The primary principles of NDN, which include naming and in-network caching, are perfectly aligned with the IoV requirements for time and location independence. Despite signific...
| Published in: | IEEE Open Journal of Vehicular Technology |
|---|---|
| Main Authors: | Saddam Hussain, Ali Tufail, Haji Awg Abdul Ghani Naim, Muhammad Asghar Khan Khan, Gordana Barb |
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/11152359/ |
Similar Items
Evaluation of Computationally Efficient Identity-Based Proxy Signatures
by: Saddam Hussain, et al.
Published: (2025-01-01)
by: Saddam Hussain, et al.
Published: (2025-01-01)
Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations
by: N.R. Sunitha, et al.
Published: (2011-08-01)
by: N.R. Sunitha, et al.
Published: (2011-08-01)
Design and implementation of proxy-protected proxy signature based on SM2
by: Qing-xiao GUO, et al.
Published: (2017-09-01)
by: Qing-xiao GUO, et al.
Published: (2017-09-01)
Design and implementation of proxy-protected proxy signature based on SM2
by: Qing-xiao GUO,Da-wei ZHANG,Jing-wen SONG, et al.
Published: (2017-09-01)
by: Qing-xiao GUO,Da-wei ZHANG,Jing-wen SONG, et al.
Published: (2017-09-01)
An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator
by: E. A. Tolyupa
Published: (2013-08-01)
by: E. A. Tolyupa
Published: (2013-08-01)
Group–Proxy Signature Scheme: A Novel Solution to Electronic Cash
by: Bao Haiyong, et al.
Published: (2013-06-01)
by: Bao Haiyong, et al.
Published: (2013-06-01)
SMAD-LDS: enhanced secure message authentication and dissemination with lightweight digital signature in the Internet of Vehicles
by: Islam Z. Ahmed, et al.
Published: (2025-06-01)
by: Islam Z. Ahmed, et al.
Published: (2025-06-01)
On the Classification of Proxy Digital Signature Schemes
by: A. A. Varfolomeev
Published: (2010-03-01)
by: A. A. Varfolomeev
Published: (2010-03-01)
Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator
by: E. A. Tolyupa
Published: (2014-04-01)
by: E. A. Tolyupa
Published: (2014-04-01)
Forward secure proxy signature scheme
by: WANG Xiao-ming, et al.
Published: (2005-01-01)
by: WANG Xiao-ming, et al.
Published: (2005-01-01)
Forward secure proxy signature scheme
by: WANG Xiao-ming, et al.
Published: (2005-01-01)
by: WANG Xiao-ming, et al.
Published: (2005-01-01)
Two Quantum Proxy Blind Signature Schemes Based on Controlled Quantum Teleportation
by: Qiming Luo, et al.
Published: (2022-10-01)
by: Qiming Luo, et al.
Published: (2022-10-01)
ID-based, Proxy, Threshold Signature Scheme
by: Jacek Pomykała, et al.
Published: (2021-05-01)
by: Jacek Pomykała, et al.
Published: (2021-05-01)
The Realization of One Proxy Digital Signature Scheme on the base of Russian Standards
by: A. A. Varfolomeev
Published: (2010-03-01)
by: A. A. Varfolomeev
Published: (2010-03-01)
Provably secure certificate less blind proxy re-signatures
by: Tao FENG, et al.
Published: (2012-09-01)
by: Tao FENG, et al.
Published: (2012-09-01)
Provably secure certificate less blind proxy re-signatures
by: Tao FENG, et al.
Published: (2012-09-01)
by: Tao FENG, et al.
Published: (2012-09-01)
Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme
by: Zhanzhen Wei, et al.
Published: (2025-08-01)
by: Zhanzhen Wei, et al.
Published: (2025-08-01)
Attribute-based proxy signature scheme for unmanned aerial vehicle networks
by: Lei HE, et al.
Published: (2021-11-01)
by: Lei HE, et al.
Published: (2021-11-01)
Attribute-based proxy signature scheme for unmanned aerial vehicle networks
by: Lei HE, et al.
Published: (2021-11-01)
by: Lei HE, et al.
Published: (2021-11-01)
Provably secure and efficient proxy signature scheme
by: Jie ZENG, et al.
Published: (2014-08-01)
by: Jie ZENG, et al.
Published: (2014-08-01)
Provably secure and efficient proxy signature scheme
by: Jie ZENG, et al.
Published: (2014-08-01)
by: Jie ZENG, et al.
Published: (2014-08-01)
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
by: Li YAN, et al.
Published: (2015-10-01)
by: Li YAN, et al.
Published: (2015-10-01)
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
by: Li YAN, et al.
Published: (2015-10-01)
by: Li YAN, et al.
Published: (2015-10-01)
VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV
by: Yinyan Gong, et al.
Published: (2023-05-01)
by: Yinyan Gong, et al.
Published: (2023-05-01)
Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice
by: Fengyin Li, et al.
Published: (2023-08-01)
by: Fengyin Li, et al.
Published: (2023-08-01)
Partially blind proxy re-signature scheme with proven security
by: Xiaodong YANG, et al.
Published: (2018-02-01)
by: Xiaodong YANG, et al.
Published: (2018-02-01)
Partially blind proxy re-signature scheme with proven security
by: Xiaodong YANG, et al.
Published: (2018-02-01)
by: Xiaodong YANG, et al.
Published: (2018-02-01)
Secure and Efficient maTLS With Proxy Signature Scheme
by: Taehyun Ahn, et al.
Published: (2025-01-01)
by: Taehyun Ahn, et al.
Published: (2025-01-01)
Proxy re-signature scheme based on isomorphisms of polynomial
by: Hui-xian LI, et al.
Published: (2017-02-01)
by: Hui-xian LI, et al.
Published: (2017-02-01)
Proxy re-signature scheme based on isomorphisms of polynomial
by: Hui-xian LI, et al.
Published: (2017-02-01)
by: Hui-xian LI, et al.
Published: (2017-02-01)
Partially Blind Proxy Re-Signature Scheme Without Bilinear Pairing
by: NIU Shufen, LI Wenting, WANG Caifen
Published: (2020-05-01)
by: NIU Shufen, LI Wenting, WANG Caifen
Published: (2020-05-01)
Identity-Based Proxy Signature with Message Recovery over NTRU Lattice
by: Faguo Wu, et al.
Published: (2023-03-01)
by: Faguo Wu, et al.
Published: (2023-03-01)
A service-categorized security scheme with physical unclonable functions for internet of vehicles
by: Nadhir Ben Halima, et al.
Published: (2023-12-01)
by: Nadhir Ben Halima, et al.
Published: (2023-12-01)
ECAE: An Efficient Certificateless Aggregate Signature Scheme Based on Elliptic Curves for NDN-IoT Environments
by: Cong Wang, et al.
Published: (2025-04-01)
by: Cong Wang, et al.
Published: (2025-04-01)
Evolution of VANETS to IoV: Applications and Challenges
by: Faisal Rasheed Lone, et al.
Published: (2021-01-01)
by: Faisal Rasheed Lone, et al.
Published: (2021-01-01)
Certificateless Anonymous Authentication Scheme Supporting Illegal Signatures Localization for Internet of Vehicles
by: YANG Xiaodong, LI Muzi, MA Guozu, LI Songyu, WANG Caifen
Published: (2024-06-01)
by: YANG Xiaodong, LI Muzi, MA Guozu, LI Songyu, WANG Caifen
Published: (2024-06-01)
Proxy Signature-Based Management Model of Sharing Energy Storage in Blockchain Environment
by: Yiting Wang, et al.
Published: (2020-10-01)
by: Yiting Wang, et al.
Published: (2020-10-01)
New Lattice-Based Short Proxy Signature Scheme With Fewer System Parameters in the Standard Model
by: Zecheng Wang, et al.
Published: (2022-01-01)
by: Zecheng Wang, et al.
Published: (2022-01-01)
A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things
by: Syed Sajid Ullah, et al.
Published: (2020-01-01)
by: Syed Sajid Ullah, et al.
Published: (2020-01-01)
A Service-Efficient Proxy Mobile IPv6 Extension for IoT Domain
by: Habib Ullah Khan, et al.
Published: (2023-08-01)
by: Habib Ullah Khan, et al.
Published: (2023-08-01)
Similar Items
-
Evaluation of Computationally Efficient Identity-Based Proxy Signatures
by: Saddam Hussain, et al.
Published: (2025-01-01) -
Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations
by: N.R. Sunitha, et al.
Published: (2011-08-01) -
Design and implementation of proxy-protected proxy signature based on SM2
by: Qing-xiao GUO, et al.
Published: (2017-09-01) -
Design and implementation of proxy-protected proxy signature based on SM2
by: Qing-xiao GUO,Da-wei ZHANG,Jing-wen SONG, et al.
Published: (2017-09-01) -
An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator
by: E. A. Tolyupa
Published: (2013-08-01)
