Internet of vehicles conditional privacy protection method and system based on certificateless aggregation signature

A technology for privacy protection and Internet of Vehicles, which is applied in the field of certificateless aggregated signatures to achieve the effects of high storage overhead, avoiding key escrow problems, and resisting selective message attacks

Active Publication Date: 2016-11-16
HOHAI UNIV
View PDF6 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is that the existing conditional privacy protection...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of vehicles conditional privacy protection method and system based on certificateless aggregation signature
  • Internet of vehicles conditional privacy protection method and system based on certificateless aggregation signature
  • Internet of vehicles conditional privacy protection method and system based on certificateless aggregation signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0035] The conditional privacy protection method for Internet of Vehicles based on certificateless aggregated signatures in the present invention can be realized based on bilinear pairings. The following first briefly introduces the basic definition of bilinear pairings and the properties it satisfies.

[0036] Let G 1 is an additive cyclic group of order q, G 2 is a multiplicative cyclic group of order q, and P is the group G 1 The generator of , where q is a large prime number. Suppose G 1 and G 2 The CDH problem on both groups is hard. If defined in group G1 and group G 2 Previous Mapping e:G 1 ×G 1 →G 2 Satisfy the following three properties, then the mapping is called a valid bilinear pairing. bilinear pair e:G 1 ×G 1 →G 2 is group G 1 Cartesian product G with itself 1 ×G 1 to group G 2 The mapping, that is, the bilinear pair ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an internet of vehicles conditional privacy protection method and system based on certificateless aggregation signature. The internet of vehicles conditional privacy protection method based on certificateless aggregation signature is provided based on a certificateless cryptosystem. On the basis of internet of vehicle conditional privacy protection of a traditional public key cryptosystem, an aggregation signer aggregates various different signatures into one signature, the internet of vehicles conditional privacy protection scheme is realized by employing a key generation center KGC and a tracking authentication center TRA, the problems of certificate management and key hosting are avoided, the computing efficiency of an internet of vehicles is improved when the aggregation signature is authenticated, the conditional privacy protection of internet of vehicles users is realized, and the method and the system can be applied in the open internet of vehicles safely.

Description

technical field [0001] The present invention relates to the technical field of certificateless aggregate signature in information security, in particular to a vehicle networking conditional privacy protection method and system based on certificateless aggregate signature. Background technique [0002] In 2003, Al-Riyami He and Paterson publicly proposed the concept of Certificateless Public Key Cryptography (CLS-PKC) for the first time at the Asian Cryptography Conference, and gave the first certificateless signature scheme (Certificateless Signature Scheme, CLS). [0003] In certificateless public key cryptography, the user's private key is composed of two parts, one part is the partial private key (Partial PrivateKey) provided to the user through a secure channel by the trusted third-party key generation center KGC ; The other part is the secret value (Secret Value) chosen by the user himself. Since the key generation center only knows part of the private key information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04L29/08
Inventor 李继国李涛张亦辰李非非王瑶
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products