用户名: 密码: 验证码:
适用于车载网的匿名异构聚合签密方案
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:An anonymous heterogeneous aggregate signcryption scheme for vehicular networks
  • 作者:牛淑芬 ; 李振彬 ; 王彩芬
  • 英文作者:NIU Shu-fen;LI Zhen-bin;WANG Cai-fen;College of Computer Science and Engineering,Northwest Normal University;
  • 关键词:车载网 ; 异构聚合签密 ; 匿名 ; 隐私安全
  • 英文关键词:vehicular network;;heterogeneous aggregate signcryption;;anonymous;;privacy security
  • 中文刊名:JSJK
  • 英文刊名:Computer Engineering & Science
  • 机构:西北师范大学计算机科学与工程学院;
  • 出版日期:2019-01-15
  • 出版单位:计算机工程与科学
  • 年:2019
  • 期:v.41;No.289
  • 基金:国家自然科学基金(61562077,61462077,61662071,61662069);; 西北师范大学青年教师科研能力提升计划(NWNULKQN-14-7)
  • 语种:中文;
  • 页:JSJK201901011
  • 页数:8
  • CN:01
  • ISSN:43-1258/TP
  • 分类号:84-91
摘要
异构聚合签密既能够实现不同密码系统之间信息传输的机密性和不可伪造性,也能够降低通信开销。结合车载网的特点,提出了一个无证书密码系统到基于身份密码系统的异构聚合签密方案,并采用不同的系统参数来增强系统的安全性。方案能够同时为多个消息进行验证,并为发送者实现了身份匿名,有效解决了用户的隐私安全问题。同时,在随机预言模型下证明了该方案满足不可区分性和不可伪造性。数据对比实验表明,该方案相对于同类型方案有效地降低了通信开销,适合用于车载网络。
        Heterogeneous aggregate signcryption can not only achieve the confidentiality and unforgeability of information transmission between different cryptosystems,but also reduce the cost of data communication.Combining with the characteristics of vehicular networks,we present a heterogeneous aggregate signcryption scheme from certificateless cryptography to identity-based cryptography,and adopt different system parameters to enhance the security of the system.The scheme can simultaneously verify multiple messages and keep the sender's identity anonymous,which can effectively secure the privacy of users.Moreover,we prove the indiscernibility and unforgeability of the scheme under the random oracle model.Data comparison experiments show that compared with the schemes of the same type,the proposed scheme is effective in reducing communication cost and more suitable for vehicular networks.
引文
[1]Al-Sultan S,Al-Doori M M,Al-Bayatti A H,et al.A comprehensive survey on vehicular Ad Hoc network[J].Journal of Network&Computer Applications,2014,37(1):380-392.
    [2]Cooper C,Franklin D,Ros M.A comparative survey of VA-NET clustering techniques[J].IEEE Communications Surveys&Tutorials,2017,19(1):657-681.
    [3]Guo X Y,Chen C L,Gong C Q.A secure official vehicle communication protocol for VANET[C]∥Proc of International Conference on Innovative Mobile and Internet Services in U-biquitous Computing,2016:482-485.
    [4]Yang Tao,Wang Ya-kun,Ge Yun-feng,et al.An efficient and accountable privacy-preserving protocol for VANET[J].Computer Engineering,2015,41(11):186-189.(in Chinese)
    [5]Zheng Yu-liang.Digital signcryption or how to achieve cost(signature&encryption)?cost(signature)+cost(encryption)[M]∥Advances in Cryptology.Berlin:Springer,1997:165-179.
    [6]Baek J,Steinfeld R,Zheng Yu-liang.Formal proofs for the security of signcryption[J].Journal of Cryptology,2007,20(2):203-235.
    [7]Pang Liao-jun,Gao Lu,Li Hui-xian,et al.Anonymous multireceiver ID-based signcryption scheme[J].Iet Information Security,2015,9(3):194-201.
    [8]Li Fa-gen,Zhang Hui,Tsuyoshi T.Efficient signcryption for heterogeneous systems[J].IEEE Systems Journal,2013,7(3):420-429.
    [9]Zhang Xue,Ji Hui-fang,Li Guang-song,et al.Identity-based signcryption cross autonomous domains[J].Computer Science,2015,42(5):165-168.(in Chinese)
    [10]Zhou Yan-wei,Yang Bo,Zhang Wen-zheng.Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing[J].Discrete Applied Mathematics,2016,204(C):185-202.
    [11]Li Fa-gen,Han Ya-nan,Jin Chun-hua.Practical signcryption for secure communication of wireless sensor networks[J].Wireless Personal Communications,2016,89(4):1-22.
    [12]Sun Yin-xia,Li Hui.Efficient signcryption between TPKCand IDPKC and its multi-receiver construction[J].Science China Information Sciences,2010,53(3):557-566.
    [13]Huang Qiong,Wong D S,Yang Guo-min.Heterogeneous signcryption with key privacy[J].Computer Journal,2011,54(4):525-536.
    [14]Zhang Yu-lei,Wang Huan,Li Chen-yi,et al.Provable secure and compact certificateless aggregate signcryption scheme[J].Journal of Electronics&Information Technology,2015,37(12):2838-2844.(in Chinese)
    [15]Du Hong-zhen.An aggregate signcryption scheme for secure communication of vehicular ad hoc network[J].Science of Henan,2016,34(8):1226-1231.(in Chinese)
    [16]Horng S J,Tzeng S F,Huang P H,et al.An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks[J].Information Sciences,2015,317(C):48-66.
    [17]Eslami Z,Pakniat N.Certificateless aggregate signcryption[J].Journal of King Saud University-Computer and Information Sciences,2014,26(3):276-286.
    [18]Wang Hao,Liu Zhen,Liu Zhe,et al.Identity-based aggregate signcryption in the standard model from multilinear maps[J].Frontiers of Computer Science,2016,10(4):1-14.
    [19]Chen Ju-qin,Ren Xiao-xi.A privacy protection scheme based on certificateless aggregate signcryption and masking random number in smart grid[C]∥Proc of the 4th International Conference on Mechanical Materials and Manufacturing Engineering,2016:10-13.
    [20]Niu Shu-fen,Niu Ling,Wang Cai-fen,et al.A provable aggregate signcryption for heterogeneous systems[J].Journal of Electronics&Information Technology,2017,39(5):1213-1218.(in Chinese)
    [21]Han Yi-liang,Chen Fei.The multilinear maps based certificateless aggregate signcryption scheme[C]∥Proc of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery,2015:92-99.
    [22]Bao Feng,Robert H,Zhu Hua-feng.Variations of DiffieHellman problem[C]∥Proc of International Conference on Information and Communications Security(ICICS 2003),2003:301-312.
    [23]Chow S S M,Yiu S M,Hui L C K,et al.Efficient forward and provably secure id-based signcryption scheme with public verifiability and public ciphertext authenticity[C]∥Proc of International Conference on Information Security and Cryptology,2003:352-369.
    [24]The pairing-based cryptography library[EB/OL].[2016-01-01].http://crypto.stanford.edu/pbc/.
    [4]杨涛,王亚坤,葛云峰,等.一种高效可审计的VANET隐私保护协议[J].计算机工程,2015,41(11):186-189.
    [9]张雪,冀会芳,李光松,等.基于身份的跨信任域签密方案[J].计算机科学,2015,42(5):165-168.
    [14]张玉磊,王欢,李臣意,等.可证安全的紧致无证书聚合签密方案[J].电子与信息学报,2015,37(12):2838-2844.
    [15]杜红珍.适于车载网安全通信的聚合签密算法[J].河南科学,2016,34(8):1226-1231.
    [20]牛淑芬,牛灵,王彩芬,等.一种可证安全的异构聚合签密方案[J].电子与信息学报,2017,39(5):1213-1218.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700