期刊文献+

车载网络中基于群签名的可保护隐私的车辆认证 被引量:3

Privacy Preserving Vehicle Authentication Based on Group Signature in Vehicular Networks
下载PDF
导出
摘要 安全和隐私是配置车载网络时所需要的2个重要条件,具有保护隐私功能的认证是实现这2个条件的关键技术.不同于已有的认证方案,文中用群签名来实现车载网络中能保护隐私的车辆认证.为了满足认证的快速性要求,基于目前安全性最强、效率较高和签名较短的ZL 06局部验证者撤销短群签名方案,提出了2个具有隐私保护功能的车载网络中的车辆认证方案.群签名所具有的良好性质保证了所提出的认证方案具有实用性和隐私保护功能. Security and privacy are two integrated issues in deploying vehicular networks. Privacy preserving authentication is a key technique in addressing these two issues. Using group signature is proposed to authenticate vehicles in vehicular networks. To meet the requirements of speediness of authentication, ZL06 shorter verifier-local revocation group signature scheme is chosen as the underlying scheme, which is the most secure and more effective one by now. According to the selected group signature scheme,two privacy preserving authentication mechanisms are given which are suitable for vehicular networks. The outstanding properties of group signature guarantee that the authentication schemes have desirable properties of practical privacy preserving.
出处 《武汉理工大学学报(交通科学与工程版)》 2008年第3期405-408,共4页 Journal of Wuhan University of Technology(Transportation Science & Engineering)
基金 国家自然科学基金项目资助(批准号:60473027)
关键词 交通工程 隐私保护的车辆认证 局部验证者撤销短群签名 车载网络 traffic engineering privacy preserving vehicle authentication short verifier local revoca-tion group signature vehicular network
  • 相关文献

参考文献11

  • 1RITA. Vehicle infrastructure integration[EB/OL]. [2007-12-15]. http://www. its. dot. gov/vii/docs/ vii-factsheet. pdf.
  • 2Hubaux J,Capcun S,Luo J. The security and privacy of smart vehicles [J]. IEEE Security and Privacy, 2004,4 (3): 49-55.
  • 3Sha K W,Xi Y,Shi W S,et al.Adaptive privacypreserving authentication in vehicular networks [C]//Proceedings of IEEE International Workshop on Vehicle Communication and Applications. Beijing : IEEE Press, 2006 : 1-8.
  • 4Xi Y,Sha K W,Shi W S,et al. Enforcing privacy using symmetric random key-set in vehicular networks [C]//Proceedings of the 8th International symposium on Autonomous Decentralized Systems (ISADS). Sedona A Z :IEEE Press, 2007 : 21-23.
  • 5Chaum D, van Heyst E. Group signatures [C]// Davies D W. EUROCRYPT'91,LNCS 547, Berlin Heidelberg : Springer-Verlag, 1992 : 257-265.
  • 6Camenisch J, Stadler M. Efficient group signature schemes for large groups[C]//Kaliski B S. CRYP- TO'97, LNCS 1294, Berlin Heidelberg: Springer- Verlag, 1997 : 410-424.
  • 7Ateniese G,Camenisch J,Joye M, et al. A practical and provably secure coalition-resistant group signature scheme[C]//Bellare M. CRYPTO 2000,LNCS 1880. Berlin Heidelberg : Springer-Verlag, 2000 : 255- 270.
  • 8Bresson E,Stern J. Efficient revocation in group signatures[C]//Kim K. PKC 2001,LNCS 1992. Berlin Heidelberg : Springer-Verlag, 2001 : 190-206.
  • 9Boneh D,Shacham H. Group signatures with verifier-local revocation [C]//CCS' 04 ,Washington : ACM, 2004:168-177.
  • 10Nakanishi T,Funabiki N. Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps [C]//Roy B. ASIACRYPT 2005, LNCS 3788, Berlin Heidelberg : Springer-Verlag, 2005 : 533-548.

同被引文献25

  • 1吴静,刘衍珩,王健,李伟平.车载自组网的可信认证与信任评估框架[J].通信学报,2009,30(S1):107-113. 被引量:9
  • 2常促宇,向勇,史美林.车载自组网的现状与发展[J].通信学报,2007,28(11):116-126. 被引量:191
  • 3SHIM K A. CPAS: an efficient conditional privacy-preserving au- thentication scheme for vehicular sensor networks[ J]. IEEE Trans- actions on Vehicular Technology, 2012, 61(4) : 1874 - 1883.
  • 4SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of CRYPTO 84, LNCS 196. Berlin: Springer, 1985:47-53.
  • 5RAYA M, HUBAUX J P. The security of ,~ehiculm" Ad Hoc net- works [ C]//Proceedings of the 3rd ACM Workshop on Security uf Ad Hoc and Sensor Networks. New York: ACM, 2005:11 -2l.
  • 6RAYA M, HUBAUX J P. Securing vehicular Ad Hoc networks[ J}. Journal of Computer Security, 2007, 15 ( 1 ) : 39 -68.
  • 7LIN X, SUN X, HO P, et al. GSIS: secure vehicular communica- tions with privacy preserving [ J]. IEEE Transactions on Vehicular Technology, 2007, 56(6): 3442-3456.
  • 8BONEH D, BOYEN X, SHACHAM H. Short group signatures [ C] // Proceedings of CRYPTO 2004, LNCS 3152. Berlin: Spring- er. 2004:41-55.
  • 9ZHANG C, LU R, LIN X, et al. An efficient identity-based batch verification scheme for vehicular sensor networks[ C]// Proceedings of the 27th Conference on Computer Communications. Piscataway: IEEE, 2008:246-250.
  • 10LU R, LIN X, ZHU H, et al. ECPP: efficient conditional privacy preservation protocol for secure vehicular communications[ C]//Pro- ceedings of the 27th Conference on Computer Communications. Pis- cataway: IEEE, 2008:1229 - 1237.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部