期刊文献+

物联网中基于位置的数字签名方案 被引量:3

Position Based Digital Signature Scheme in IoTs
下载PDF
导出
摘要 物联网可用于收集大量与位置和时间相关的信息,如智能消防、智能交通、环境监测信息等.然而,如何保障这些时空敏感数据的安全成为了一个挑战.一方面,需要提供数据的完整性属性;另一方面,需要确保数据源的位置和时间信息不可伪造.因此,提出了基于位置的数字签名,将其作为解决物联网中时空敏感数据安全问题的方案.首先,分别提出了不考虑时间因素的静态基于位置数字签名和考虑时间因素的动态基于位置数字签名;然后,在BRM模型下设计了3维空间中满足动态安全需求的基于位置数字签名;通过安全性分析,得出结论:该协议可以抵御敌手的共谋攻击,同时满足可证明安全. Nowadays,lots of location and time critical data has been collected by Internet of things(IoTs),such as intelligent fire control,intelligent transportation,environmental monitoring and so on.It is well known that the location and time information of these data will play an important role on some applications in IoTs.For example,the time and location information is generated in the fire alarm system,vehicle system and UAV data acquisition system.However,how to guarantee the security of these spatio-temporal data has become a challenge.One hand,the property of the data integrity should be provided;the other hand,the location and time information of the data origin should be unforgeable.This study investigates position based signatures as one of the solutions to the security of the spatio-temporal data in IoTs.Firstly,the static position based digital signature without considering time and the dynamic position based digital signature with time constraint is proposed respectively.Then,aposition based digital signature protocol based on the bounded retrieval model in3-dimension is proposed which satisfies the security requirements of dynamic conditions.Furthermore,by analyzing the security of our protocol,we conclude that the proposed protocol can resist collusion attack of the adversaries and satisfy the provable security.
作者 阙梦菲 张俊伟 杨超 杨力 马建峰 崔文璇 Que Mengfei;Zhang Junwei;Yang Chao;Yang Li;Ma Jianfeng;Cui Wenxuan(School of Cyber Engineering,Xidian University,Xi'an 710071)
出处 《计算机研究与发展》 EI CSCD 北大核心 2018年第7期1421-1431,共11页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61472310 U1536202 U1405255 61672413 61672415 61671360)~~
关键词 物联网 基于位置密码学 基于位置数字签名 有界检索模型 可证明安全 IoTs position based cryptography position based digital signature bounded retrieval model (BRM) provable security
  • 相关文献

参考文献5

二级参考文献32

  • 1韦宝典.树结构在几种特殊签名中的应用研究[J].计算机工程与应用,2006,42(11):16-20. 被引量:1
  • 2李凤华,冯涛,马建峰.基于VSPH的UC不经意传输协议[J].通信学报,2007,28(7):28-34. 被引量:8
  • 3Zheng Yuliang.Digital signcryption or how to achieve cost (signature and encryption) 《《 cost (signature) + cost (encryption)[G] //LNCS1294,CRYPTO'1997.Berlin:Springer,1997:165-179.
  • 4AI-Riyami S S,Paterson K G.Certificateless public key cryptography[G] //LNCS2894:Asiacrypt'03.Berlin!Springer,2003:452-473.
  • 5Shamir A.Identity-based cryptosystems and signature schemes[G] //LNCS196:CRYPTO'1984.Berlin; Springer,1984:47-53.
  • 6Aranha D,Castro R,Lopez J,et al.Efficient certificateless signcryption[EB/OL].(2008-09-05)[2009-03-21].http.//sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_01_resumo.pdf.
  • 7Wu Chenhuang,Chen Zhixiong.A new efficient certificateless signcryption scheme[C] //Proc of ISISE'08.Piscataway,NJ:IEEE,2008:661-664.
  • 8Barreto P L,Deusajute A M,Cruz E C,et al.Toward efficient certificateless signcryption from (and without)bilinear pairings[EB/OL].(2008-09-05)[2009-03-21].http://sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_03_artigo.pdf.
  • 9Sharmila D S,Vivek S S,Pandu R C.On the security of certificateless signcryption schemes[EB/OL].(2009-03-05)[2009-06-12].Http://eprint.Iacr.Org/2009/298.Pdf.
  • 10Barbosa M,Farshim P.Certificateless signcryption[C] //Proc of ASIACCS'2008.New York:ACM,2008:369-372.

共引文献189

同被引文献33

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部