Internet of vehicle condition privacy protection method based on certificateless aggregate signcryption and system

A technology for privacy protection and Internet of Vehicles, which is applied in the field of conditional privacy protection for Internet of Vehicles, and can solve problems such as inefficient application of privacy protection methods for Internet of Vehicles conditions

Active Publication Date: 2017-01-04
HOHAI UNIV
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is to provide a conditional privacy protection method and system for the Internet of Vehicles based on certificateless aggregate signcryption, wh

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of vehicle condition privacy protection method based on certificateless aggregate signcryption and system
  • Internet of vehicle condition privacy protection method based on certificateless aggregate signcryption and system
  • Internet of vehicle condition privacy protection method based on certificateless aggregate signcryption and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0052] The conditional privacy protection method for Internet of Vehicles based on certificateless aggregation signcryption in the present invention can be realized based on bilinear pairing. The following first briefly introduces the basic definition of bilinear pairing and the properties it satisfies.

[0053] Let G 1 is an additive cyclic group of order q, G 2 is a multiplicative cyclic group of order q, and P is the group G 1 The generator of , where q is a prime number. Suppose G 1 and G 2 The CDH problem on both groups is hard. If defined in group G 1 and group G 2 Previous Mapping e:G 1 ×G 1 →G 2 Satisfy the following three properties, then the mapping is called a valid bilinear pairing. bilinear pair e:G 1 ×G 1 →G 2 is group G 1 Cartesian product G with itself 1 ×G 1 to group G 2 The mapping, that is, the bilinear pair e:G...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of vehicle condition privacy protection method based on certificateless aggregate signcryption and a system, wherein the method and the system have excellent performance based on a certificateless password system. According to the method, problems of certificate management and secret key escrow can be avoided, calculation efficiency of the Internet of vehicle during aggregate signcryption verification and aggregate signcryption efficiency during network transmission are improved, condition privacy protection of Internet-of-vehicle users is realized, and the method and the system can be safely utilized in the open Internet of vehicle.

Description

technical field [0001] The invention relates to a vehicle networking conditional privacy protection method and system based on certificateless aggregate signcryption, and belongs to the technical field of certificateless aggregate signcryption in information security. Background technique [0002] In 2003, Al-Riyami He and Paterson publicly proposed the concept of Certificateless Public Key Cryptography (CLS-PKC) for the first time at the Asian Cryptography Conference, and gave the first certificateless signature scheme (Certificateless Signature Scheme, CLS). [0003] In certificateless public key cryptography, the user's private key is composed of two parts, one part is the partial private key (Partial PrivateKey) provided to the user through a secure channel by the trusted third-party key generation center KGC ; The other part is the secret value (Secret Value) chosen by the user himself. Since the key generation center only knows part of the private key information of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3247H04L63/0407H04L63/083H04L67/12
Inventor 李继国李涛张亦辰王瑶李非非
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products