Internet of things (IoT) privacy protection method and system for preventing ciphertext from being tampered based on CP-ABE

A CP-ABE, privacy protection technology, applied in the direction of transmission system, digital transmission system, public key of secure communication, etc., can solve the problem of easy tampering in communication

Active Publication Date: 2017-08-18
HUNAN UNIV OF SCI & ENG
View PDF3 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention proposes a CP-ABE-based ciphertext anti-tampering privacy protection method and system for Internet of Vehicles. With the Ciphertext Policy Attribute-Based Encryption (CP-ABE) mechanism, the vehicle node that sends the message independently formulates an access policy based on the attributes of the vehicle node that receives the message. The access policy is deployed in the ciphertext, and only the attributes of the vehicle node receiving the message Only when it is satisfied can it be decrypted successfully, with strong flexibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things (IoT) privacy protection method and system for preventing ciphertext from being tampered based on CP-ABE
  • Internet of things (IoT) privacy protection method and system for preventing ciphertext from being tampered based on CP-ABE
  • Internet of things (IoT) privacy protection method and system for preventing ciphertext from being tampered based on CP-ABE

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0054] Such as figure 1 As shown, a CP-ABE-based ciphertext tamper-proof privacy protection method for Internet of Vehicles includes the following steps:

[0055] Step 1: Use the trusted authorization center to generate the ciphertext tamper-proof system public key, system master key and public parameters;

[0056] The trusted authorization center TA selects a bilinear group whose order is a prime number p and whose generator is g. G 0 The bilinear map e:G on 0 ×G 0 →G 1 , define the hash function H:{0,1} * →G 0 , this function can convert the user attribute described by a string of any length into a bilinear group G 0 random numbers on . Randomly choose α, β ∈ Z p , generate the system public key:

[0057] PK=(G 0 ,g,h,h=g β ,e(g,g) α )

[0058] System master key:

[0059] MK=(β,g α )

[0060] Step 2: The vehicle node receiving the re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of things (IoT) privacy protection method and an IoT privacy protection system for preventing ciphertext from being tampered based on CP-ABE. The method provides a ciphertext strategy attribute-based encryption mechanism, a vehicle node sending a message can autonomously develop an access strategy according to the attribute of the vehicle node receiving the message, the access strategy is deployed in the ciphertext, only the attribute of the vehicle node receiving the message is met, successful decryption can be achieved, and extremely strong flexibility is provided. Meanwhile, in order to prevent the sent message from being captured and tampered, a credible authorization center maps the ciphertext and a related parameter into a random number by using a Hash function, when performing decryption, a message accepter firstly verifies whether the message is tampered, and then decrypts the message if the message is not tampered. Not too much complex computation is introduced into the scheme; according to the scheme, interaction efficiency between the vehicle nodes is improved, while security of communication between the vehicle nodes in the Internet of things is ensured.

Description

technical field [0001] The invention relates to a CP-ABE-based ciphertext tamper-proof privacy protection method and system for Internet of Vehicles. Background technique [0002] In recent years, ITS (Intelligent Traffic System) has become the development direction of future transportation. As an extension of the Internet of Things in the field of intelligent transportation systems, the Internet of Vehicles is a core component of intelligent transportation systems. Through the comprehensive perception of roads and traffic, the Internet of Vehicles can realize large-scale and large-capacity data transmission and interaction among multiple transportation systems, and support real-time control of road vehicles, thereby improving traffic safety and traffic efficiency. [0003] However, since the Internet of Vehicles network communicates through wireless channels, it will inevitably face many threats and attacks, such as: attackers inject false and wrong information into the In...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L29/06H04L29/08
CPCH04L9/0819H04L9/0861H04L9/30H04L63/083H04L63/205H04L67/12
Inventor 罗恩韬唐雅媛廖文芳赵全友李文
Owner HUNAN UNIV OF SCI & ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products