期刊文献+

基于代理盲签名的车载自组网认证技术研究 被引量:4

Research of a Authentication Scheme Based on the Proxy Blind Signature Scheme for the Vehicular Ad-hoc Networks
下载PDF
导出
摘要 研究了适用于移动车载自组织网络的基于代理盲签名方案的移动节点认证技术。针对移动车载自组网在大规模节点组网和节点移动时,认证复杂且效率低下的问题,提出一种基于代理多重签名和盲签名的认证技术。该技术采用代理签名方案适应车载节点的移动性,代理多重签名解决节点间重复认证问题,采用盲签名方案适应了车载网分布式系统的复杂性和实现了车载节点间认证的交互性,最后采用基于DSA变形的代理盲签名方案避免伪造攻击,并给出认证系统体系结构和安全签名密钥发布模型。实验分析表明,该技术能够较好地适应车载节点的移动性和复杂性,在车载网安全性和认证效率上具有良好的性能。 we proposed a signature scheme based on the proxy multi-signature and blind signature certification technology.This technology,using proxy signature scheme and mobility of vehicle-mounted node to proxy multi-signature solve between the nodes authentication problems,the repeated to blind signature scheme vehicle-mounted nets distributed system's complexity and realize the on-board authentication interactivity between the nodes,finally the agency based on DSA deformation to avoid blind signature scheme,and gives collusion attack authentication system structure and secure signature key release model.Experimental results showed that this technology can better meet the on-board node mobility and complexity,in the on-board nets safety and the authentication efficiency has good performance.
作者 徐甜 宋强
出处 《科技通报》 北大核心 2012年第10期170-173,共4页 Bulletin of Science and Technology
关键词 车载自组网 代理盲签名 签名认证 安全协议 vehicular ad-hoc network proxy blind signature anonymous authentication security protocol
  • 相关文献

参考文献5

二级参考文献26

  • 1戴元军,杨成,马春光.一个基于知识证明签名的安全电子拍卖协议[J].计算机工程与应用,2004,40(27):26-28. 被引量:1
  • 2马春波,何大可.矢量空间秘密共享群签名方案[J].电子学报,2005,33(2):294-296. 被引量:8
  • 3马春波,敖珺,何大可.基于双线性映射的多重签名与群签名[J].计算机学报,2005,28(9):1558-1563. 被引量:14
  • 4IETF MANET work group[EB/OL].http://www.ietf.org/html.charters/manet-charter.html
  • 5Khalili A,Katz J,Arbaugh W,et al.Toward secure key distribution in truly ad hoc networks[C]// Proceedings of the 2003 Symposium on Application and the Internet Workshops.[S.l.]:IEEE Computer Society,2003:1-5
  • 6Deng Hongmei,Mukherjee A,Agrawal D P.Threshold and identity-based key management and authentication for wireless ad hoc networks[C]// Proceedings of the International Conference on Information Technology:Coding and Computing (ITCC 2004).[S.l.]:IEEE Computer Society,2004:107-111
  • 7Dolev D,Yao A C.On the security of public-key protocols[J].IEEE Trans on Information Theory,1983,29(2):198-208
  • 8Shamir S.How to share a secret[J].Communications of the ACM,1979,22(11),612-613
  • 9Cha J,Cheon J H.An identity-based signature from gap diffie-hellman groups[C]// Proc of the PKC 2003.[S.l.]:Springer-Verlag,2003,18(30):18-30
  • 10Shamir A.Identity-based cryptosystems and signature schemes[C]// Proceedings of Crypto'84,Lecture Notes in Computer Science.[S.l.]:Springer-Verlag,1984:47-53

共引文献46

同被引文献21

  • 1Bissmeyer N,Stresing C,Bayarou K M.Intrusion detection in VANETs through verification of vehicle movement data[C]//Proc of IEEE Vehicular Networking Conference.[S.l.]:IEEE Press,2010:166-173.
  • 2Gerla M,Kleinrock L.Vehicular networks and the future of the mobile Internet[J].Computer Networks,2011,55(2):457-469.
  • 3Liu Nianbo,Liu Ming,Lou Wei,et al.PVA in VANETs:stopped cars are not silent[C]//Proc of IEEE INFOCOM.[S.l.]:IEEE Press,2011:431-435.
  • 4Lequerica I,Martinez J A,Ruiz P M.Efficient certificate revocation in vehicular networks using NGN capabilities[C]//Proc of the 72nd IEEE Vehicular Technology Conference Fall.[S.l.]:IEEE Press,2010:1-5.
  • 5Laberteaux K P,Haas J J,Hu Y C.Security certificate revocation list distribution for VANET[C]//Proc of the 5th ACM International Workshop on Vehicular Internet Working.New York:ACM Press,2008:88-89.
  • 6Papadimitratos P P,Mezzour G,Hubaux J P.Certificate revocation list distribution in vehicular communication systems[C]//Proc of the 5th ACM International Workshop on Vehicular Internet Working.New York:ACM Press,2008:86-87.
  • 7Haas J J,Hu Y C,Laberteaux K P.Efficient certificate revocation list organization and distribution[J].IEEE Journal on Selected A-reas in Communications,2011,29(3):595-604.
  • 8Eckhoff D,German R,Sommer C,et al.Slotswap:strong and affordable location privacy in intelligent transportation systems[J].IEEE Communications Magazine,2011,49(11):126-133.
  • 9Morency C,Trépanier M.Characterizing parking spaces using travel survey data,CIRRELT-2008-15[R].[S.l.]:CIRRELT,2008:234-239.
  • 10Crepaldi R,Welsh R,Kravets R.Governing energy for parked cars[C]//Proc of the 10th Annual Conference on Wireless On-demand Network Systems and Services.[S.l.]:IEEE Press,2013:87-94.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部