Forward-secure certificateless anonymous authentication method in v2g environment
A technology of forward security and anonymous authentication, applied in the field of V2G security, can solve complex certificate management and other problems, and achieve the effect of satisfying forward security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] The present invention will be further described in detail below in conjunction with specific embodiments, which are explanations of the present invention rather than limitations.
[0050] Such as figure 1 As shown, a forward-secure certificateless anonymous authentication method in a V2G environment includes the following steps:
[0051] 1) System initialization: it includes the stage of TA setting system parameters. The specific process is as follows:
[0052] TA (Trust Authority, trusted organization) generates bilinear parameters (G, G T , g, e, q, p) satisfy q|p-1 (| means divisibility). TA randomly selects system parameters Order g η =g η , G,G T is a multiplicative cyclic group of prime p order, q is its generator, A range is generated for the parameters, called a multiplicative group, e refers to the bilinear pairing operation, and n is the number of limiting parameters chosen, similar to degrees of freedom. η is called the revocation factor, which i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


