检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:崔永泉[1] 曹玲 张小宇 曾功贤 CUI Yong-Quan;CAO Ling;ZHANG Xiao-Yu;ZENG Gong-Xian(School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074;Department of Computer Science, University of Hong Kong, Hong Kong)
机构地区:[1]华中科技大学计算机科学与技术学院,武汉430074 [2]香港大学计算机科学系
出 处:《计算机学报》2019年第5期980-992,共13页Chinese Journal of Computers
基 金:国家"九七三"重点基础研究发展规划项目基金(2014CB340600);国家自然科学基金(61173050)资助~~
摘 要:现今,车联网在学术以及智能交通等领域已经成为一个研究热点.车联网有一些显著的优点:(1)为驾驶者和交通管理员提供了便利(如实时交通信息系统);(2)提高了车辆行驶的安全程度(如追尾提前警告系统).这样一种应用需要车辆用户之间共享信息.然而在实际应用中,车辆之间的通讯可以被恶意攻击者用来定位和跟踪车辆,因此隐私保护在车联网中至关重要.虽然之前已经提出了一些解决方案,但是这些方案都存在各类缺点.该文提出了一个新的基于格困难问题的环签名方案来解决这个问题.相比于其他方案,格基环签名方案实现了无条件的匿名性,在必要的时候还可以为授权方提供可追踪性.另外,该文方案不同于采用传统公钥密码进行隐私保护的方案,而是基于格的环上错误学习问题而设计的,这样可以确保其在量子算法攻击下的安全性.In contemporary society, Vehicular Ad-hoc Network (VANET) has been a hot research topic in academic as well as other fields, such as intelligent transportation field. The application, VANET, has some charming strengths:(1) it can provide more convenient service for drivers and traffic managers (e.g. real time traffic information system);(2) it also increases the safety of vehicle traffic (e.g. rear-end early warning system). Such kind of service or convenience is based on shared information from participant users. The information includes the time, the location and other information about the roads and traffic. Usually, the message is broadcasted among many vehicles or temporary networks. Thus, communications between vehicles can be easily eavesdropped by some malicious attackers, who may be one of the normal users among the networks. And the message can be used by malicious attackers to locate and track the vehicles in practice. Therefore, it is essential to preserve the privacy in VANET. To our knowledge, there are many scheme proposed to solve this problem and they can be classified into as follows: anonymous certification, pseudo ID, group signature and ring signature. And currently, the most accepted schemes are based on pseudo ID, where users need to change their identities regularly and which is easy to be implemented. However, if the identity is changed in a not appropriate time, then the solution may not be effective. As for the anonymous certification schemes, though they offer conditional traceability with high computational efficiency, the distribution, the revocation and the huge storage of these certifications become the thorny problems. And the group signature based schemes are convenient to form a temporary network automatically and also have the property of traceability and anonymity. However, a role in these scheme, named group administrator, becomes the bottleneck of security, who is powerful and is needed to be trusted by others. In this paper, we will focus on the ring signature scheme which
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.46