期刊文献+

车联网可验证匿名身份方案构建探索 被引量:1

Constructing a verifiable anonymous identities scheme in VANETs
下载PDF
导出
摘要 针对车联网中存在的有条件隐私保护问题,提出了一个有效的匿名通信方案.该方案基于零知识证明协议构建.在车联网中,车辆向交通管理部门注册后,通过零知识证明协议向身份验证机构证明自己的成员身份,但不泄露任何与身份相关的信息,通过验证后,车辆即可生成用于消息认证的公私钥对,并将公钥发送给验证机构保存.该方案可使车联网中的车辆进行匿名通信,并可以验证其身份的真实性,还可在发生交通争执时根据需要通过权威机构揭示相关车辆的真实身份并撤销其权限.该方案还保证了同一用户不同消息间具有不可链接性,揭示同一用户多个秘钥中的一个不会影响其他密钥的安全性. The conditional privacy preserving issue in vehicular ad hoc networks (VANETs) was ad- dressed. An efficient communication scheme was proposed based on a zero knowledge proof protocol; when a vehicle is registered with its traffic authority information in VANETs, its membership is certified by means of a zero-knowledge certification protocol without any identity-related information being disclosed. After passing the authentication, the vehicle can generate public and private key pairs for message authentication and send the public key to the verification authority to save. The. proposed scheme provides anonymous but verifiable identities for vehicles in VANETs and it also provides unlink- ability of messages belonging to a vehicle, i.e. allowing an authority to disclose their identity when a dispute arises, but without affecting the anonymity and unlinkability of their remaining messages.
作者 梅颖
出处 《兰州大学学报(自然科学版)》 CAS CSCD 北大核心 2017年第3期421-426,共6页 Journal of Lanzhou University(Natural Sciences)
关键词 车联网 隐私保护 零知识证明 匿名性 不可链接性 vehicular ad hoc network privacy preserving zero knowledge proof anonymity unlink-ability
  • 相关文献

参考文献1

二级参考文献26

  • 1Manulis M. Democratic group signatures - On an example of joint ventures. In Proc. ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), Taiwan, China, 2006, p.365.
  • 2Liu J K, Wei V K, Wong D S. Linkable spontaneous anonymous group signature for ad hoc groups. In Proc. ACISP 04, Australia, LNCS 3108, Springer-Verlag, 2004, pp.325-335.
  • 3Liu J K, Wong D S. Enhanced security models and a generic construction approach for linkable ring signature. International Journal of Foundations of Computer Science, Dec. 2006, 17(6): 1403-1422.
  • 4Komano Y, Ohta K, Shimbo A, Kawamura S. Toward the fair anonymous signatures: Deniable ring signatures. In Proc. CT-RSA 2006, USA, LNCS 3860, Springer-Verlag, 2006, pp.174-191.
  • 5An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. In Proc. EUROCRYPT 02, The Netherlands, LNCS 2332, Springer-Verlag, 2002, pp.83-107.
  • 6Rivest R, Shamir A, Tauman Y. How to leak a secret. In Proc. ASIACRYPT 2001, Australia, Lecture Notes in Computer Science, 2248, Springer-Verlag, 2001, pp.552-565.
  • 7Bresson E, Stern J, Szydlo M. Threshold ring signatures and applications to ad-hoc groups. In Proc. CRYPTO 2002, USA, Lecture Notes in Computer Science, 2442, Springer-Verlag, 2002, pp.465-480.
  • 8Abe M, Ohkubo M, Suzuki K. 1-out-of-n signatures from a variety of keys. In Proc. ASIACRYPT 2002, New Zealand, Lecture Notes in Computer Science, 2501, Springer-Verlag, 2002, pp.415-432.
  • 9Wong D S, Fung K, Liu J, Wei V. On the RS-code construction of ring signature schemes and a threshold setting of RST. In Proc. 5th Int. Conference on Information and Communication Security ( ICICS 2003), China, Lecture Notes in Computer Science, 2836, Springer-Verlag, 2003, pp.34-46.
  • 10Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. In Proc. EUROCRYPT 2003, Poland, Lecture Notes in Computer Science, 2656, Springer-Verlag, 2003, pp.416-432.

共引文献5

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部