A Privacy Protection Scheme in VANETs Based on Group Signature

来源 :第十二届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:sleon001
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  At present,Vehicular Ad-Hoc Networks(VANETs)has been a hot research topic for researchers in the intelligent transportation.It can not only provide real-time traffic information for managers,but also provide effective safety protection for drivers.However,in practical applications,the communication between vehicles is in a real-time changing network environment,which may be eavesdropping,locating and tracking.Therefore,it is essential to preserve the privacy in VANETs.Based on the Chinese remainder theorem and DSA signature algorithm,this paper proposes an efficient revocable group signature privacy protection scheme for VANETs.It can not only protect the anonymity of the vehicles,but also provide traceability for the Trusted Authority(TA)when traffics escape.At the same time,it can provide revocable functions for the vehicles when they send malicious messages or are in dispute.From the proofs of correctness and security,we know that they can not only have the properties of traceability and anonymity,but also can resist against framed attacks.According to the performance verification,we obtain it can improve the efficiency of signatures and meet the demand for real-time and efficient for VANETs.
其他文献
Based on the different representations of the finite field GF(256),there are different AES implementations,called dual ciphers.They have the same encryption process as AES,but with parameters modified
In order to deeply understand the security features of Windows and explore the flaws of Windows UAC mechanism,the origin of UAC mechanism is firstly introduced,and then its implementation principles a
Network functions such as intrusion detection systems(IDS)have been increasingly deployed as virtual network functions or outsourced to cloud service providers to achieve the scalability and agility a
CPS 系统架构逐渐成为工业互联网建构的重要途径,对于未来智联网建设也具有重要研究价值。由于区块链环境下,CPS系统呈现高度分布式、异构耦合等特点,如何对异构耦合的CPS 面临的级联失效等过程进行可靠性分析变得至关重要。迄今为止,该问题尚无有效而彻底的解决方案。本文首先对耦合异构CPS 系统进行了建模,并给出该系统模式下级联失效过程的理论分析;在此基础上,基于仿真实验对比分析,给出影响异构耦合CP
本文针对无人机组网过程中的密钥管理与认证问题,面向不同应用场景提出了有控制站支持的无人机网络认证方案(ASUSG)和无控制站支持的无人机网络认证方案(ASWGS),实现了无人机节点间的密钥管理和身份认证。其中,ASUSG 充分利用控制站计算资源充足、通信链路稳定的特点,将控制站作为密钥生成中心,控制站基于椭圆曲线密码体制对节点进行认证和分发密钥,节点间的认证借助控制站完成;ASWGS 基于身份密码
Nowadays,user preference data collected from e-commerce platforms have become broadly available,which makes the possibility of data mining and analyzing to improve the users experience of individual p
At present,APT attack detection has become the focus of the network security protection _eld.APT attacks are one of the most di_cult attacks in cyber attacks.The complexity and variability of AP-T att
At present,cloud computing is developing rapidly and users can access all kinds of cloud services on cloud servers anytime and anywhere.However,cloud computing is also facing urgent security problems
集合计算作为安全多方计算领域的一个重要层面,其在保密的数据挖掘、敏感医疗数据分析及网络社交等方面都有着重要的应用价值。陈等人(电子学报,2017 年)利用离散对数困难问题,设计了一种高效的集合成员关系安全两方计算协议,该方案的构造方法很新颖,具有很高的计算效率而且十分简洁。作者研究发现该协议存在一个安全漏洞,可以使得集合拥有者能够获得另一方所拥有的元素信息。在此基础上,基于集合多项式表示技术及离散
With the rapid development of software technology,software vulnerability has become a major threat to computer security.The timely detection and repair of potential vulnerabilities in software,is of g