CN114501427A - Travel riding matching method based on privacy protection - Google Patents
Travel riding matching method based on privacy protection Download PDFInfo
- Publication number
- CN114501427A CN114501427A CN202111675395.1A CN202111675395A CN114501427A CN 114501427 A CN114501427 A CN 114501427A CN 202111675395 A CN202111675395 A CN 202111675395A CN 114501427 A CN114501427 A CN 114501427A
- Authority
- CN
- China
- Prior art keywords
- travel
- vehicle
- passenger
- passengers
- riding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 230000004044 response Effects 0.000 claims abstract description 19
- 238000004891 communication Methods 0.000 claims abstract description 15
- 238000012795 verification Methods 0.000 claims abstract description 12
- 238000005516 engineering process Methods 0.000 claims abstract description 8
- 125000004122 cyclic group Chemical group 0.000 claims description 3
- 238000013507 mapping Methods 0.000 claims description 3
- 239000000126 substance Substances 0.000 claims description 2
- 230000008569 process Effects 0.000 description 5
- 230000007547 defect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 239000000779 smoke Substances 0.000 description 2
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 229910052799 carbon Inorganic materials 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000003912 environmental pollution Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 239000000446 fuel Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/44—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/121—Timestamp
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Traffic Control Systems (AREA)
Abstract
The invention discloses a travel riding matching method based on privacy protection, which comprises the following steps of: s1, TA initializes and distributes public key, private key, reputation certificate and pseudonym identity for the registration entity; s2, selecting personalized travel preference requirements by the passengers, injecting the requirements into a bloom filter, encrypting travel riding requests, calculating information signatures for the travel riding requests, verifying the reputation certificates and the validity of the information signatures of the passengers by the RSU, and broadcasting information to nearby vehicles after the verification is passed; s3, the vehicle injects the preference attribute set into a bloom filter, encrypts the travel riding response, and calculates an information signature for the travel riding response; and S4, judging whether the vehicle meets the individual requirements of the passengers or not, and carrying out travel riding matching on the vehicle and the passengers. The method is based on the intersection technology of the bloom filter and the privacy set, and is applied to the travel riding matching, so that the privacy of the passengers is protected, the calculation cost and the communication cost are reduced, and the travel riding experience of the passengers is improved.
Description
Technical Field
The invention belongs to the technical field of car networking privacy protection, and particularly relates to a travel riding matching method based on privacy protection.
Background
With the development of intelligent transportation, dynamic travel by means of the internet of vehicles becomes a new travel mode. And the dynamic travel ride is used for matching a plurality of passengers with similar travels with the target vehicle according to the travel information provided by the passengers and the vehicles. The traffic environment can be improved by taking a bus when the bus goes out, the number of vehicles on a road is reduced by improving the utilization rate of vehicle seats, the problem of traffic jam is further relieved, and the road smooth rate is improved. In addition, fuel consumption and carbon emission are reduced when the bus is taken out, and the problem of environmental pollution is further improved. However, when a passenger goes out, if the personalized requirements of the passenger are not considered, the matching error of the passenger during the trip can be caused, the service quality is reduced, and the personalized requirements of the passenger usually contain some privacy information, so that the privacy of the passenger is easily leaked due to the fact that the personalized requirements of the passenger are stolen by an attacker.
At present, scholars at home and abroad obtain certain research results in the aspect of privacy protection of travel riding matching. The clear text information based on the passengers and the vehicles is adopted for travel and riding matching in the early period, and although the matching speed is high, the matching is convenient and fast, the privacy of the passengers and the vehicles is easy to leak. In order to protect privacy of a vehicle and passengers when traveling buses are matched, in 2017, Hallgren et al propose to realize traveling bus matching through similarity and track matching of a starting point and an end point, and adopt additional homomorphic encryption and a threshold value private set intersection protocol to protect user privacy. In 2018, Li et al propose to use privacy proximity testing during travel ride matching to achieve one-to-many proximity matching while protecting the privacy of the vehicle and passengers. In 2020, Yu et al propose privacy-preserving travel ride matching that calculates distance by means of encryption and aggregation, and protects the privacy of the vehicle and passengers by means of homomorphic encryption.
The existing literature makes up for the defect of privacy protection when travelling is matched, but some problems exist. According to the existing scheme, the individual requirements of passengers are not considered when travelling and taking a bus, the balance between the accurate matching of the passengers and the vehicle and the privacy protection cannot be realized, and the matching error between the passengers and the vehicle is possibly caused, for example, the passengers who do not smoke match the vehicle driven by a smoke extraction driver, so that the passengers can perform negative feedback on the vehicle after the travelling and taking a bus, the user experience is influenced, and the travelling and taking effect is reduced.
Disclosure of Invention
The invention mainly aims to overcome the defects and shortcomings of the prior art, and provides a travel riding matching method based on privacy protection.
In order to achieve the purpose, the invention adopts the following technical scheme:
a trip riding matching method based on privacy protection comprises a trusted center TA, a road side unit RSU, a vehicle and passengers, wherein the TA, the RSU, the vehicle and the passengers are communicated in a wireless communication or wired communication mode, and the method comprises the following steps:
s1, initializing, namely, initializing by the trusted center and distributing a public key, a private key, a reputation certificate and a pseudonymous identity for each registered entity;
s2, making a travel request, selecting an individualized travel preference demand by a passenger, injecting the individualized travel preference demand into a bloom filter, encrypting the travel request, calculating an information signature for the travel request, verifying the validity of a reputation certificate and the information signature of the passenger by a road side unit, and broadcasting information to nearby vehicles after the verification is passed;
s3, generating a travel riding response, injecting a preference attribute set into a bloom filter by the vehicle for matching with the personalized requirements of passengers, encrypting the travel riding response by an encryption algorithm, and calculating an information signature for the travel riding response;
and S4, matching the traveling bus, verifying the certificate and the signature of the vehicle by the roadside unit, judging whether the vehicle meets the personalized requirements of the passengers or not by adopting a privacy set intersection technology based on the bloom filter, and matching the traveling bus with the passengers.
Further, step S1 is specifically:
given a safety parameter 1τThe trust center generates parameters (G)1,G2E), then TA calculates e (g)1,g2)=F;
Wherein G is1,G2Is a cyclic group of prime order q, g1,g2Are each G1And G2G, bilinear mapping e1×G1→G2;
TA random selectionAs master private key, i.e. MSKTT and calculate the public key PKT=g1 tSelecting a hash function H1:H2:Setting a distance threshold
Setting passenger PiIs a unique identity identifier ofTA selectionAs passenger PiA private key of, i.e.And calculates the public key for the passenger
Setting passenger PiThe reputation certificate ofWherein the content of the first and second substances,the validity period of the reputation certificate;
Setting a vehicle ViIs a unique identity identifier ofTA random selectionFor vehicles ViA private key of, i.e.And calculating a public key for the vehicle
Setting a vehicle ViThe pseudonym identity isSetting a set of vehicle initial preference attributes to
Road side unit RiAt registration time, TA random selectionIs RiA private key of, i.e.Computing public keys
Further, step S2 is specifically:
passenger PiWhen a passenger wants to go out, the passenger firstly selects individual travel preference and sets the travel preference selected by the passenger asRandom number r selected by passenger1By usingSet of travel preferences to be selectedInjecting into a bloom filter;
then passenger PiSelecting a starting positionAnd destinationForm a travel requestWhereinA timestamp is generated for the travel taking request;
Last passenger PiUsing ELGAMMA encryption algorithm with parametersEncrypted travel requestForming a ciphertextWill be provided withSent to the road side unit Ri;
RiReceiving informationThen, a travel riding request ciphertext is decrypted by adopting a decryption algorithm and a private key, namely
RiVerifying a passenger PiReputation certificate equation:
Riverifying a passenger PiEquation for travel request signature:
after verification, RiWill be provided withBroadcast to nearby vehicles, whereinIs a messageA timestamp of when generated.
Further, step S3 is specifically:
when the road side unit RiNearby vehicle ViReceiving travel request messageAfter that, adoptSet own preference attributeInjecting into a bloom filter;
then the vehicle ViSetting the maximum number of passengers CNmaxSelecting a starting positionAnd destinationForm a trip riding responseWhereinA timestamp generated for the trip riding response;
Finally, the vehicle adopts ELGAMMA encryption algorithm and uses parametersEncrypted travel riding responseForming a ciphertextWill be provided withSent to the road side unit Ri。
Further, step S4 is specifically:
road side unit RiReceiving informationThen, the decryption algorithm and the private key are adopted for decryption, namely
RiValidating vehicle ViReputation certificate equation:
Rivalidating vehicle ViEquation for travel ride response signature:
after verification, RiEquation matching vehicle origin and destination:
last road side unit RiJudging preference attribute set of vehicle by adopting privacy set intersection technology based on bloom filterAnd personalized travel preferences selected by the passengerWhether there is an intersection IiIf I isiAndin the same way, the vehicle meets all the individual requirements, R, of the passengersiSuccessfully matching the vehicle with the passenger and sending a messageWhereinAre the communication keys of the vehicle and the passengers,as informationA timestamp of when generated;
finally, the vehicle and the passenger employ communicationSecret keyAnd carrying out communication.
Compared with the prior art, the invention has the following advantages and beneficial effects:
1. according to the method, when the travel and the ride are matched, a privacy set intersection technology based on the bloom filter is adopted, whether the vehicle meets the individual requirements of the passengers or not is judged according to the travel preference selected by the passengers, and the problem of wrong matching of the travel and the ride caused by neglecting the individual requirements of the passengers is solved.
2. The trip riding matching scheme provided by the invention does not reveal the privacy of the vehicle and the passenger in the matching process, and realizes the balance between the accurate matching of the trip riding and the privacy protection. And the matching efficiency of the travel bus is improved, and the expenditure is reduced.
Drawings
FIG. 1 is a flow chart of the method of the present invention;
FIG. 2 is a conceptual model diagram of the present invention.
Detailed Description
The present invention will be described in further detail with reference to examples and drawings, but the present invention is not limited thereto.
Examples
The invention discloses a travel riding matching method based on privacy protection, which comprises a trusted center TA, a road side unit RSU, a vehicle and passengers; 4, the components can communicate with each other in a wireless communication or wired communication mode; the TA is mainly responsible for distributing public and private keys, certificates and the like for the registered entity; the RSU is responsible for verifying the validity of the reputation certificates and the information signatures of the vehicles and the passengers and matching the vehicles and the passengers for outgoing riding; the passenger is responsible for sending the encrypted travel riding request; the vehicle is responsible for sending encrypted travel ride responses.
In this embodiment, as shown in fig. 2, it is a schematic diagram of the conceptual model of the present invention.
As shown in fig. 1, the method of the present invention comprises the steps of:
s1, initializing, namely, the trusted center initializes and distributes a public key, a private key, a reputation certificate and a pseudonym identity for each registered entity; the method specifically comprises the following steps:
setting System safety parameters 1τ;
Generating a cyclic group G of prime order q1And G2Bilinear mapping e: G1×G1→G2;
g1And g2Are each G1And G2E (g) is calculated as the generator of1,g2)=F;
TA Generation System Master Key and public Key (MSK)T,PKT) Wherein MSKT=t,PKT=g1 tSetting a distance threshold
TA distributing public and private keys to vehiclesWhereinPublic distribution of private keys to passengersWhereinRoad side unit RiPublic and private key ofWherein
TA separately calculates reputation certificates for vehicles and passengersAndwhereinAndthe validity period of the reputation certificate;
S2, making a travel request, selecting an individualized travel preference demand by a passenger, injecting the individualized travel preference demand into a bloom filter, encrypting the travel request, calculating an information signature for the travel request, verifying the validity of a reputation certificate and the information signature of the passenger by a road side unit, and broadcasting information to nearby vehicles after the verification is passed; the method specifically comprises the following steps:
passenger PiWhen a passenger wants to go out, the passenger firstly selects individual travel preference and sets the travel preference selected by the passenger asRandom number r selected by passenger1By usingSet of travel preferences to be selectedInjecting into a bloom filter;
then passenger PiSelecting a starting positionAnd destinationForm a travel requestWhereinA timestamp is generated for the travel taking request;
Last passenger PiUsing ELGAMMA encryption algorithm with parametersEncrypted travel requestForming a ciphertextWill be provided withSent to the road side unit Ri;
RiReceiving informationThen, a travel riding request ciphertext is decrypted by adopting a decryption algorithm and a private key, namely
RiVerifying a passenger PiReputation certificate equation:
Riverifying a passenger PiEquation for travel request signature:
after verification, RiWill be provided withBroadcast to nearby vehicles, whereinIs a messageA timestamp of when generated.
S3, generating a travel riding response, injecting a preference attribute set into a bloom filter by the vehicle for matching personalized requirements of passengers, encrypting the travel riding response by adopting an ELGAMMA encryption algorithm, and calculating an information signature for the travel riding response; the method specifically comprises the following steps:
suppose a vehicle ViIs a set of preference attributes ofVehicle ViSelecting a random number r2By usingWill be provided withInjecting into a bloom filter;
maximum number of passengers CN for vehicle travelingmaxSelecting a starting positionAnd destinationForm a trip riding responseWhereinA timestamp generated for the trip riding response;
S4, matching traveling and taking a bus, verifying a certificate and a signature of the vehicle by the roadside unit, judging whether the vehicle meets the personalized requirements of passengers or not by adopting a privacy set intersection technology based on a bloom filter, and matching the traveling and taking the bus with the passengers; the method specifically comprises the following steps:
road side unit RiReceiving informationAfter that, decryption is adoptedAlgorithm and private key decryption, i.e.
RiValidating vehicle ViReputation certificate equation:
Rivalidating a vehicle ViEquation for travel ride response signature:
after verification, RiEquation matching vehicle origin and destination:
last road side unit RiJudging preference attribute set of vehicle by adopting privacy set intersection technology based on bloom filterAnd personalized travel preferences selected by the passengerWhether there is an intersection IiIf I isiAndin the same way, the vehicle meets all the individual requirements, R, of the passengersiSuccessfully matching the vehicle with the passenger and sending a messageWhereinAre the communication keys of the vehicle and the passengers,as informationA timestamp of when generated.
In this embodiment, the process of verifying the correctness of the reputation certificate and the signature is as follows (hereinafter, the passenger P is referred to as the passenger P)iFor example):
verification of reputation certificate:
verification of correctness of the signature:
it should also be noted that in this specification, terms such as "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (5)
1. A trip riding matching method based on privacy protection is characterized by comprising a trusted center TA, a road side unit RSU, a vehicle and passengers, wherein the TA, the RSU, the vehicle and the passengers are communicated in a wireless communication or wired communication mode, and the method comprises the following steps:
s1, initializing, namely, initializing by the trusted center and distributing a public key, a private key, a reputation certificate and a pseudonymous identity for each registered entity;
s2, making a travel request, selecting an individualized travel preference demand by a passenger, injecting the individualized travel preference demand into a bloom filter, encrypting the travel request, calculating an information signature for the travel request, verifying the validity of a reputation certificate and the information signature of the passenger by a road side unit, and broadcasting information to nearby vehicles after the verification is passed;
s3, generating a travel riding response, injecting a preference attribute set into a bloom filter by the vehicle for matching with the personalized requirements of passengers, encrypting the travel riding response by an encryption algorithm, and calculating an information signature for the travel riding response;
and S4, matching the traveling bus, verifying the certificate and the signature of the vehicle by the roadside unit, judging whether the vehicle meets the personalized requirements of the passengers or not by adopting a privacy set intersection technology based on the bloom filter, and matching the traveling bus with the passengers.
2. A travel ride matching method based on privacy protection according to claim 1, wherein step S1 specifically comprises:
given a safety parameter 1τThe trust center generates parameters (G)1,G2E), then TA calculates e (g)1,g2)=F;
Wherein G is1,G2Is a cyclic group of prime order q, g1,g2Are each G1And G2G, bilinear mapping e1×G1→G2;
TA random selectionAs master private key, i.e. MSKTT and calculate the public key PKT=g1 tSelecting a hash function H1:H2:Setting a distance threshold
Setting passenger PiIs a unique identity identifier ofTA selectionAs passenger PiA private key of, i.e.And calculates the public key for the passenger
Setting passenger PiThe reputation certificate ofWherein the content of the first and second substances, the validity period of the reputation certificate;
Setting a vehicle ViIs a unique identity identifier ofTA random selectionFor vehicles ViA private key of, i.e.And calculating a public key for the vehicle
Setting a vehicle ViThe pseudonym identity isSetting the initial preference attribute set of the vehicle as
3. A travel ride matching method based on privacy protection according to claim 2, wherein step S2 specifically comprises:
passenger PiWhen a passenger wants to go out, the passenger firstly selects individual travel preference and sets the travel preference selected by the passenger asRandom number r selected by passenger1By usingSet of travel preferences to be selectedInjecting into a bloom filter;
then passenger PiSelecting a starting positionAnd destinationForm a travel requestWhereinA timestamp is generated for the travel taking request;
Last passenger PiUsing ELGAMMA encryption algorithm with parametersEncrypted travel requestForming a ciphertextWill be provided withSent to the road side unit Ri;
RiReceiving informationThen, a travel riding request ciphertext is decrypted by adopting a decryption algorithm and a private key, namely
RiVerifying a passenger PiReputation certificate equation:
Riverifying passengersPiEquation for travel request signature:
4. A travel ride matching method based on privacy protection according to claim 3, wherein step S3 specifically comprises:
when the road side unit RiNearby vehicle ViReceiving travel request messageAfter that, adoptSet own preference attributeInjecting into a bloom filter;
then the vehicle ViSetting the maximum number of passengers CNmaxSelecting a starting positionAnd destinationForm a trip riding responseWhereinA timestamp is generated for the trip riding response;
5. The privacy protection-based travel ride matching method according to claim 4, wherein step S4 is specifically:
road side unit RiReceiving informationThen, the decryption algorithm and the private key are adopted for decryption, namely
RiValidating vehicle ViReputation certificate equation:
Rivalidating vehicle ViEquation for travel ride response signature:
after verification, RiEquation matching vehicle origin and destination:
last road side unit RiJudging preference attribute set of vehicle by adopting privacy set intersection technology based on bloom filterAnd personalized travel preferences selected by the passengerWhether there is an intersection IiIf I isiAnd withIn the same way, the vehicle meets all the individual requirements, R, of the passengersiSuccessfully matching the vehicle with the passenger and sending a messageWhereinAre the communication keys of the vehicle and the passengers,as informationA timestamp of when generated;
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111675395.1A CN114501427B (en) | 2021-12-31 | Traveling riding matching method based on privacy protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111675395.1A CN114501427B (en) | 2021-12-31 | Traveling riding matching method based on privacy protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114501427A true CN114501427A (en) | 2022-05-13 |
CN114501427B CN114501427B (en) | 2024-05-24 |
Family
ID=
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160364678A1 (en) * | 2015-06-11 | 2016-12-15 | Raymond Cao | Systems and methods for on-demand transportation |
WO2019041896A1 (en) * | 2017-09-04 | 2019-03-07 | 东北大学 | Virtual mix-zone-based vanet position privacy protection system and method |
CN110365485A (en) * | 2019-06-20 | 2019-10-22 | 北京理工大学 | A kind of privacy of user protection scheme of the about vehicle based on block chain |
CN113158250A (en) * | 2021-04-29 | 2021-07-23 | 合肥工业大学 | Privacy protection network car booking method and system for eliminating once matched driver |
CN113806807A (en) * | 2021-09-22 | 2021-12-17 | 合肥工业大学 | Network taxi appointment system and method based on privacy contract |
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160364678A1 (en) * | 2015-06-11 | 2016-12-15 | Raymond Cao | Systems and methods for on-demand transportation |
WO2019041896A1 (en) * | 2017-09-04 | 2019-03-07 | 东北大学 | Virtual mix-zone-based vanet position privacy protection system and method |
CN110365485A (en) * | 2019-06-20 | 2019-10-22 | 北京理工大学 | A kind of privacy of user protection scheme of the about vehicle based on block chain |
CN113158250A (en) * | 2021-04-29 | 2021-07-23 | 合肥工业大学 | Privacy protection network car booking method and system for eliminating once matched driver |
CN113806807A (en) * | 2021-09-22 | 2021-12-17 | 合肥工业大学 | Network taxi appointment system and method based on privacy contract |
Non-Patent Citations (2)
Title |
---|
LINFENG WEI ET AL.: "Automatic XSS Detection and automatic anti-anti-virus payload generation", IEEE:CYBERC, 2 January 2020 (2020-01-02) * |
刘丹;石润华;仲红;张顺;崔杰;许艳;: "车载自组织网中条件隐私保护认证方案", 计算机应用, no. 05, 10 May 2015 (2015-05-10) * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109922475B (en) | Vehicle authentication and message verification method under vehicle-mounted network environment | |
Jiang et al. | An efficient anonymous batch authentication scheme based on HMAC for VANETs | |
CN107947932B (en) | Vehicle ad hoc network authentication method based on non-bilinear mapping certificateless signature | |
CN109412816B (en) | Anonymous communication system and method for vehicle-mounted network based on ring signature | |
CN109005542B (en) | 5G Internet of vehicles rapid message authentication method based on reputation system | |
CN107888377B (en) | VANETs position privacy protection method based on random encryption period | |
CN109698754B (en) | Fleet safety management system and method based on ring signature and vehicle management platform | |
US9800413B2 (en) | System and method for performing an asymmetric key exchange between a vehicle and a remote device | |
CN110022542B (en) | Improved anonymous authentication method based on conditional privacy protection | |
CN104853351A (en) | Internet of Vehicles distributed authentication method based on controllable privacy | |
CN113596778A (en) | Vehicle networking node anonymous authentication method based on block chain | |
CN106027233A (en) | Method for designing vehicle network group negotiation communication protocol | |
CN114286332B (en) | Dynamic efficient vehicle-mounted cloud management method with privacy protection function | |
CN109861830B (en) | VANET-oriented efficient condition anonymous authentication method | |
CN108933665B (en) | Method for applying lightweight V2I group communication authentication protocol in VANETs | |
CN112437108A (en) | Decentralized identity authentication device and method for privacy protection of Internet of vehicles | |
CN112243234A (en) | Identity-based privacy security protection method for Internet of vehicles | |
CN115515127A (en) | Vehicle networking communication privacy protection method based on block chain | |
CN115442048A (en) | VANET-oriented block chain-based anonymous authentication method | |
CN117254910B (en) | Efficient group key distribution method based on quantum random number under vehicle-mounted ad hoc network | |
CN114501427B (en) | Traveling riding matching method based on privacy protection | |
CN114501427A (en) | Travel riding matching method based on privacy protection | |
CN116321154A (en) | Efficient message authentication method based on zero knowledge proof in Internet of vehicles environment | |
CN114302390B (en) | Intra-group authentication key negotiation method in vehicle-mounted ad hoc network | |
CN113645028B (en) | Vehicle networking condition privacy protection system and method supporting dynamic key management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Wei Linfeng Inventor after: Sun Hongliang Inventor after: Liu Zhiquan Inventor after: Yin Juli Inventor after: Wu Xiaofeng Inventor before: Sun Hongliang Inventor before: Wei Linfeng Inventor before: Liu Zhiquan Inventor before: Yin Juli Inventor before: Wu Xiaofeng |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant |