Improved anonymous authentication method based on conditional privacy protection

An anonymous authentication and privacy protection technology, which is applied in the direction of services, electrical components, and vehicle parts based on specific environments, and can solve the problems of long calculation time for anonymous certificates and signature authentication

Active Publication Date: 2019-07-16
GUILIN UNIV OF ELECTRONIC TECH
View PDF9 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution is mainly to solve the problem of long calculation time of anonymous certif

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved anonymous authentication method based on conditional privacy protection
  • Improved anonymous authentication method based on conditional privacy protection
  • Improved anonymous authentication method based on conditional privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0054] This example is carried out under certain system assumptions, the specific system model such as figure 1 As shown,

[0055] Such as figure 2 As shown, an improved anonymous authentication method based on conditional privacy protection using this system model includes the following steps:

[0056] 1) System initialization, the process is as follows:

[0057] (1) Choose three cyclic groups G 1 ,G 2 ,G T , Their orders are all large prime numbers q, starting from G 2 To G 1 , Generate a homomorphic mapping ψ:G 2 →G 1 , And satisfy ψ(g 2 )=g 1 , Where g 1 And g 2 Respectively G 1 And G 2 Generator of, so we get a bilinear mapping e:G 1 ×G 2 →G T ;

[0058] (2) According to the parameters in step (1) (G 1 ,G 2 ,G T ,e,q,g 1 ,g 2 ), the trusted agency TA generates other system parameters, and TA selects two random numbers As the private key of the system, and calculate As the public key of the system;

[0059] (3) TA chooses a one-way hash function H: And a secure symmetric encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an improved anonymous authentication method based on conditional privacy protection, which is characterized by comprising the following steps: 1) initializing a system; 2) registering vehicles; 3) registering RSU; 4) generating a short-time secret key; 5) generating an anonymous certificate; 6) performing message signing; 7) authenticating the anonymous certificate and themessage; 8) carrying out conditional tracking. According to the method, mutual authentication between the OBU and the RSU is realized; the identity information in the vehicle anonymity certificate ischanged; an attacker cannot monitor and track the identity information of the vehicle; the method can quickly find out the real identity information of a malicious vehicle and judge the invalidation of an illegal vehicle, has identity authentication, anonymity, non-linkability, privacy protection and traceability, and improves the authentication efficiency.

Description

Technical field [0001] The invention relates to the technical fields of intelligent transportation, information security, and Internet of Vehicles authentication, in particular to an improved anonymous authentication method based on conditional privacy protection. Background technique [0002] With the rapid development of technologies such as big data, mobile networks, and information processing, the Internet of Things technology has gradually been applied to various fields, including intelligent transportation systems such as the Internet of Vehicles. Intelligent transportation systems have received extensive attention at home and abroad. The Internet of Vehicles is also known as the Vehicle Self-Organizing Network (VANET). It is developed from the traditional mobile network MANET. As an important part of the intelligent transportation system, it is the key to alleviating and solving existing traffic problems. VANET is a fast-moving wireless communication network that completes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/40H04W12/02H04W12/06H04W84/18H04L9/08H04L9/32H04L29/06H04W12/041H04W12/069
CPCH04W4/40H04W12/02H04W12/06H04W84/18H04L63/0428H04L63/08H04L63/0823H04L63/0869H04L9/0869H04L9/3263H04L63/0876H04L9/0897
Inventor 古天龙苑斌常亮刘忆宁王朋李龙吕松展
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products