Unlock instant, AI-driven research and patent intelligence for your innovation.

Ring signature-based anonymous authentication system and method for in-vehicle network, vehicle communication platform

An anonymous authentication and vehicle network technology, applied in the transmission system, user identity/authority verification, electrical components, etc., can solve forgery, certificate storage and revocation, and cannot satisfy spontaneity, high efficiency, anonymity, unforgeability and tracking at the same time sexual issues

Active Publication Date: 2021-09-10
XIAN UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Aiming at the privacy protection problems that arise, prior art 1 proposes a group signature-based privacy protection authentication scheme for the Internet of Vehicles, which can meet the requirements of anonymity and traceability, but requires the assistance of RSU and the problem of certificate storage; some The scheme adopts the conditional ring signature method. The existing technology 2 proposes a privacy protection communication scheme using the conditional anonymous ring signature in the Internet of Vehicles, which does not require the participation of the group manager, but there is a problem of certificate storage and revocation; the existing technology 3 proposes a An anonymous communication framework based on a pseudonym in the Internet of Vehicles environment. This framework includes several processes such as pseudonym generation, distribution, and regeneration, and uses a distributed optimization algorithm to change the pseudonym. However, the pseudonym method needs to constantly change the pseudonym , modifying the pseudonym at an inappropriate time period or location will cause the scheme to be invalid
At the same time, prior art 4 proposes a certificate-based anonymous authentication scheme for the Internet of Vehicles, which can satisfy conditional identity tracking and has high computing efficiency, but there are problems in certificate distribution, revocation and storage of a large number of certificates in this method; Prior Art 5 proposes a threshold anonymous authentication protocol for VANET, which achieves the goal of conditional privacy and traceability by using the threshold group signature method, but the group signature method requires the participation of the group manager in the authentication process, which will lead to power is too big
It can be seen that in the existing anonymous authentication schemes for in-vehicle networks, when meeting the requirements of anonymity and unforgeability, they cannot meet the requirements of tracking the identity when the receiver is found to forge messages; some of them meet the basic security requirements. However, it cannot meet the requirements of vehicles moving at any time and spontaneously forming a ring at any time in the vehicle network environment; even the use of an identity-based ring signature scheme will cause the problem of key custody, so that a trusted third party knows the private key of each member, which will cause unnecessary An honest third party forges any member's signature, reducing security
Therefore, the existing methods cannot simultaneously meet the target requirements of spontaneity, efficiency, anonymity, unforgeability and traceability
[0003] To sum up, the problem existing in the existing technology is: in the existing vehicle network anonymous authentication scheme, usually when meeting the requirements of anonymity and unforgeability, it cannot meet the requirement of tracking the identity when the receiver is found to forge the message ; Some meet the basic security requirements, but they cannot meet the requirements of vehicles moving at any time and spontaneously forming rings in the vehicular network environment; even the use of identity-based ring signature schemes will cause key escrow problems, so that trusted third parties know each member's private key, causing a dishonest third party to forge any member's signature, reducing security
For example, a modification and replay attack on it using a previously propagated message could be fatal to some users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ring signature-based anonymous authentication system and method for in-vehicle network, vehicle communication platform
  • Ring signature-based anonymous authentication system and method for in-vehicle network, vehicle communication platform
  • Ring signature-based anonymous authentication system and method for in-vehicle network, vehicle communication platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] The present invention utilizes a certificateless ring signature and a tracking algorithm to provide a ring signature-based vehicle network anonymous authentication system and method, which can ensure anonymity and unforgeability in the vehicle communication process, and at the same time use a certificateless method to efficiently solve the key custody problem. A tracking algorithm is formed by adding some relevant information to the ring signature, and when necessary, a trusted third party cooperates with all members in the ring to track the real identity of the signer, which effectively solves the problem that the id...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of vehicle communication security, and discloses an anonymous authentication system and method for a vehicle network based on a ring signature, a vehicle communication platform; a trust mechanism and a vehicle registration with an OBU to generate a partial private key; a vehicle communication unit OBU Vehicles, before joining the vehicle ad hoc network, register and preload public system parameters and corresponding public and private keys; when the vehicle is driving on the road, it passes security certification and periodically broadcasts relevant status information; when it is found that the signer leaks false information anonymously Or its sabotage behavior, the trust agency reveals the true identity of the sender. The invention combines the certificateless public key cryptosystem with the ring signature to form the certificateless ring signature, which satisfies anonymity and unforgeability, and at the same time satisfies security certification; additional relevant information forms a traceable algorithm, which effectively solves the problem of anonymous disclosure of false information by the signer or other In case of sabotage, the identity is tracked and revoked according to the received message.

Description

technical field [0001] The invention belongs to the technical field of vehicle communication security, and in particular relates to a ring signature-based vehicle network anonymous authentication system and method, and a vehicle communication platform. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: In order to reduce traffic accidents, improve traffic conditions, and provide users with corresponding network services, VANET (vehicle network) is gradually emerging, which is a fusion of direct interconnection between vehicles , indirect interconnection, and the hybrid system structure network of interconnection between vehicles and roadside fixed facilities, which can realize vehicle-to-vehicle (Vehicle to Vehicle, V2V) and vehicle-to-roadside infrastructure (Vehicle to Infrastructure, V2I) The multi-hop wireless communication provides vehicles with a variety of safety applications (such as accident warning, tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 赖成喆胡天伟王文娟郭文龙郑东
Owner XIAN UNIV OF POSTS & TELECOMM