期刊文献+

基于安全多方计算的车载网隐私保护机制 被引量:5

Privacy Protection Mechanism Based on Secure Multi-Party Computation in VANET
原文传递
导出
摘要 为了解决当前车载网隐私保护机制的安全性和效率问题,基于安全多方计算理论和匿名认证协议,提出了一种新的车载网节点隐私保护方案.该方案利用线性方程组的求解理论,采用安全高效的茫然传输机制,避开了传统的计算复杂的公钥密码算法.对方案的安全性和效率分析的结果表明,新方案不仅能够解决车载网中发送者隐私、接收者隐私、匿名性、共谋攻击、重放攻击等多种安全问题,而且认证效率也得到了有效提高,在计算性能受限的物联网环境中,具有理论和应用价值. To solve the security and efficiency problem of the existing privacy protection schemes in ve- hicular network, a new privacy protection scheme was proposed based on security multi-party computation and anonymous authentication. Because of linear equations and secure and efficient oblivious transfer mechanism, the traditional public key cryptography algorithm is avoided. It is shown that the proposed scheme not only can fulfill multiple security requirements, such as privacy of sender, privacy of receiver, anonymity, collusion attack, replay attack, etc, but also can improve the authentication efficiency. The scheme is of significance and application value in limited computational performance environments such as Internet of Things.
作者 宋成 张明月 彭维平 贾宗璞 刘志中 SONG Cheng ZHANG Ming-yue PENG Wei-ping JIA Zong-pu LIU Zhi-zhong(School of Computer Science and Technology, Henan Polytechnic University, Henan Jiaozuo 454000, Chin)
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2017年第3期67-71,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金青年科学基金项目(61300124 61300216) 河南省科技攻关计划项目(132102210123)
关键词 安全多方计算 车载自组织网络 隐私保护 匿名认证 secure multi-party computation vehicular Ad hoe network privacy protection anonymous authentication
  • 相关文献

参考文献1

二级参考文献6

  • 1Shun-DongLi Yi-QiDai.Secure Two-Party Computational Geometry[J].Journal of Computer Science & Technology,2005,20(2):258-263. 被引量:36
  • 2罗永龙,黄刘生,荆巍巍,徐维江.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3):410-416. 被引量:44
  • 3罗永龙,黄刘生,荆巍巍,徐维江,陈国良.保护私有信息的叉积协议及其应用[J].计算机学报,2007,30(2):248-254. 被引量:30
  • 4Yao A C. Protocols for secure computations [ C ]//Proceedings of 23rd Annual IEEE Symposium on Foundations d Computer Science. Los Alamitos: IEEE Computer Society Press, 1982: 160-164.
  • 5Goldreich O, Micali S, Wigderson A. How to play any mental game[C]//Proceedings of the 19th Annual ACM Conference on Theory of Computing. New York: ACM Press, 1987: 218-229.
  • 6Du W L, Atallah M J. Privacy-preserving cooperative scientific computations [ C] // Proceedings of the 14th IEEE Computer Security Workshop. USA: IEEE Computer Society, 2001 : 273-282.

共引文献9

同被引文献19

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部