Certificateless anonymous authentication method for forward security in V2G environment
A forward security and anonymous authentication technology, applied in the field of V2G security, can solve complex certificate management and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] The present invention will be further described in detail below in conjunction with specific embodiments, which are for explanation rather than limitation of the present invention.
[0050] Such as figure 1 As shown, a forward-secure certificateless anonymous authentication method in a V2G environment includes the following steps:
[0051] 1) System initialization: including the TA setting system parameter stage. The specific process is as follows:
[0052] TA (Trust Authority) generates bilinear parameters (G, G T ,g,e,q,p) satisfies q|p-1 (| means division). TA randomly selects system parameters Let g η =g η , G,G T Is the multiplicative cyclic group of prime number p, q is its generator, It is the parameter generation range, called the multiplicative group, e refers to the bilinear pair operation, and n is the number of limited parameters selected, similar to the degree of freedom. Call η as the revocation factor, which is used to realize forward safe revocation. It...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


