期刊文献+

一个适用于车载自组织网络的安全高效的聚合签名方案 被引量:2

An Efficient and Secure Aggregate Signature Scheme for Vehicular Ad Hoc Network
下载PDF
导出
摘要 车载自组织网络是智能交通系统的基础,是实现车联网的关键技术.聚合签名技术可以在大大节省传输带宽和计算资源的前提下为多个用户提供消息认证,所以很适合用于车载自组织网中进行消息聚合和批量签名验证.首先给出了基于身份的聚合签名方案的定义和敌手模型,接着构造了一个高效的基于身份的聚合签名方案,该方案具有固定长度和固定双线性对运算量,在Computational Diffie-Hellman困难假设下证明了该方案是存在性不可伪造的.最后分析比较了方案的执行效率,指出它能以更低的计算与通信成本为车辆节点发送的信息提供安全认证. Vehicular ad hoc network(VANET)is the foundation of future intelligent transportation and the keytechnology to realize car networking. Aggregate signature can provide message authentication for multiple users under thepremise of greatly saving the transmission bandwidth and computing resources. So,it is suitable for message aggregationand batch signature verification in VANET. This paper proposes the definition and security model for ID-basedaggregate signature(IBAS)scheme,and then presents an efficient IBAS scheme with constant length and pairingcomputations. The scheme is existentially unforgeable under the computational Diffie-Hellman assumption. Lastly,theauthor analyzes the IBAS scheme's efficiencies and pointes out that it is able to provide message authentication forvehicle nodes with lower computation cost and communication overhead.
作者 杜红珍
出处 《河南科学》 2016年第4期481-485,共5页 Henan Science
基金 国家自然科学基金项目(61402015) 陕西省教育厅专项科研项目(15JK1022) 宝鸡市科技计划项目(15RKX-1-5-8 14GYGG-4-2)
关键词 车载自组织网络 聚合签名 不可伪造性 双线性对 vehicular ad hoc network aggregate signature unforgeability bilinear pairings
  • 相关文献

参考文献20

  • 1Mishra B,Mnayak P,Behera S,et al.Security in Vehicular adhoc networks:a survey[C]//Proceedings of the 2011 InternationalConference on Communication,Computing&Security.Odisha,India:ACM,2011.
  • 2Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps[C]//22thAnnual InternationalConference on the Theory and Applications of Cryptographic Techniques(Eurocrypt’03),LNCS 2656.Heidelberg Berlin:Springer-Verlag,2003.
  • 3Lysyanskaya A,Micali S,Reyzin L,et al.Sequential aggregate signatures from trapdoor permutations[C]//23th Annual Interna-tional Conference on the Theory and Applications of Cryptographic Techniques(Eurocrypt’04).Interlaken,Switzerland:Springer-Verlag,2004.
  • 4Neven G.Efficient sequential aggregate signed data[J].IEEE Transactions on Information Theory,2008,57(3):1803-1815.
  • 5Brogle K,Goldberg S,Reyzin L.Sequential aggregate signatures with lazy verification for S-BGP[C]//Proceedings of the Conferenceon Computer and Communications Security.Chicago,Illinois,USA:ACM,2011.
  • 6Lee K,Lee D H,Yung M.Sequential aggregate signatures with short public keys:design,analysis and implementation studies[C]//Proceedings of Public-Key Cryptography-PKC 2013,LNCS 7778.Nara,Japan:Kurosawa K,2013.
  • 7王大星,滕济凯.可证明安全的高效有序聚合签名方案[J].计算机工程,2015,41(8):140-143. 被引量:3
  • 8Wen Yiling,Ma Jianfeng.An aggregate signature scheme with const ant pairing operations[C]//Proc of the 2008 Int ernationalConference on Computer Science and Software Engineering.Washington,DC,USA:EEE Computer Society,2008.
  • 9Cheon J H,Kim Y,Yoon H J.A new ID-based signature with batch verification[J].Trends in Mathematics Information Centerfor Mathematical Sciences,2005,8(1):119-131.
  • 10Xu J,Zhang Z F,Feng D G.ID-based aggregate signatures from bilinear pairings[C]//Proceedings of CANS 2005,LNCS 3810.Berlin:Springer-Verlag,2005.

二级参考文献91

  • 1王彪,杨小东,黄海宁.一种基于Weil配对的群签名方案[J].北京邮电大学学报,2006,29(z2):133-135. 被引量:1
  • 2程相国,刘景美,王新梅.m-挠群上一种基于身份的聚合签名方案[J].西安电子科技大学学报,2005,32(3):427-431. 被引量:3
  • 3Boneh D, Lynn B, Shacham H. Short signatures from the Weil Pairing[J]. Journal of Cryptology,2004,17(4) :297-319.
  • 4Lysyanskaya A, Micali S, Reyzin L, et al. Sequential aggregate signatures from trapdoor permutations[C]//Advances in Cryptography-Eurocrypt 2004,3027 of LNCS. 2004 : 74-90.
  • 5Lu S, Ostrovsky R, Sahai A, et al. Sequential aggregate signa tures and muhisignatures without random oracles [C]//Ad vances in Cryptography-Eurocrypt 2006,4004 of LNCS. 2006 465-485.
  • 6Jung Hee Cheon,Yongdae Kim, Hyo Jin Yoon. A new ID-based aggregate signature with batch verifieation[OL], http://eprint. iacr. org/2004/131.
  • 7Pointcheval D, Stem J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13 (3) : 361-396.
  • 8Herranz J. Deterministic identity-based signatures for partial aggregation[J]. Computer Journal, 2006,49 (3) : 322-330.
  • 9Gentry C, Ramzan Z. Identity-based aggregate signatures[C]//Proceedings of PKC 2006,3958 of LNCS. 2006:257-273.
  • 10Camenisch J, Hohenberger S, Pedersen M O. Batch Verification of short signatures[C]//Advances in Cryptography- Eurocrypt 2007,4515 of LNCS. 2007:246-263.

共引文献18

同被引文献8

引证文献2

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部