CN114727259A - 一种基于多重签名的车联网紧急事件汇报系统构建方法 - Google Patents

一种基于多重签名的车联网紧急事件汇报系统构建方法 Download PDF

Info

Publication number
CN114727259A
CN114727259A CN202210290875.4A CN202210290875A CN114727259A CN 114727259 A CN114727259 A CN 114727259A CN 202210290875 A CN202210290875 A CN 202210290875A CN 114727259 A CN114727259 A CN 114727259A
Authority
CN
China
Prior art keywords
emergency
parameters
public
multiple signatures
vehicle end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210290875.4A
Other languages
English (en)
Other versions
CN114727259B (zh
Inventor
杨安家
陈小虎
翁健
李涛
翁嘉思
刘家男
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan University
Original Assignee
Jinan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan University filed Critical Jinan University
Priority to CN202210290875.4A priority Critical patent/CN114727259B/zh
Publication of CN114727259A publication Critical patent/CN114727259A/zh
Application granted granted Critical
Publication of CN114727259B publication Critical patent/CN114727259B/zh
Priority to US18/150,345 priority patent/US11792018B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Emergency Management (AREA)
  • Environmental & Geological Engineering (AREA)
  • Public Health (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Algebra (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computing Systems (AREA)
  • Power Engineering (AREA)
  • Multimedia (AREA)
  • Traffic Control Systems (AREA)

Abstract

本发明公开一种基于多重签名的车联网紧急事件汇报系统构建方法,包括:对紧急事件汇报系统进行初始化,得到车端集合的公私钥对和预计算参数;基于所述公私钥对和预计算参数,得到紧急事件的认证信息;整合所述认证信息,得到紧急事件多重签名;基于所述紧急事件多重签名调控交通状态,完成系统构建。实现了计算资源受限的车端高效生成签名功能,减少了路侧单元的通信压力和计算压力,能够有效防止其他方案中常见的流氓密钥攻击。

Description

一种基于多重签名的车联网紧急事件汇报系统构建方法
技术领域
本发明涉及网络空间安全技术领域,特别涉及一种基于多重签名的车联网紧急事件汇报系统构建方法。
背景技术
VANET是一种基于道路沿线车辆和基础设施的可用性而动态建立的网络。通过VANET的无线通信,车辆之间可以共享不同种类的信息。当车辆目击紧急事件(如交通事故)时,车辆可以通过VANET网络将消息和自己对该消息的签名发送给路侧单元,路侧单元在收到消息并验证签名的有效性后,向其通信范围内的车辆广播该消息,从而达到避免二次事故的目的。然而,VANET的动态特性同时也带来了许多传统网络未有的问题,如:过多车端给路侧单元发送同一紧急消息引起的广播风暴问题和车端生成签名慢导致的计算资源浪费问题等。
多重签名技术是当今一项备受关注的技术,它允许一组签名者在同一个消息上产生一个共同的签名,这个签名可以被这组签名者的公钥验证,代表这一组签名者都认可该消息。多重签名中的签名长度与签名人数无关,且始终与单个签名的长度一致,这在很大程度上降低了信息传输量和通信压力。自多重签名的概念被提出以来,多重签名的方案设计得到了充分的研究,这些方案的安全性可规约于大整数分解问题、离散对数问题和格上困难问题等。
发明内容
为解决上述现有技术中所存在的传统方法引起广播风暴和车端生成签名慢导致的计算资源浪费的问题,本发明提供一种基于多重签名的车联网紧急事件汇报系统构建方法,利用多重签名算法和次指数算法相结合,减少了路侧单元的通信压力和计算压力,避免了多重签名中常见的流氓密钥攻击。
为了实现上述技术目的,本发明提供了一种基于多重签名的车联网紧急事件汇报系统构建方法,包括:
步骤1,对紧急事件汇报系统进行初始化,得到车端集合的公私钥对和预计算参数;
步骤2,基于所述公私钥对和预计算参数,得到紧急事件的认证信息;
步骤3,整合所述认证信息,得到紧急事件的多重签名;
步骤4,基于所述多重签名调控交通状态,完成系统构建。
可选的,所述公私钥对的获取过程包括:
通过密钥管理机构注册获得所述密钥管理机构颁发的公私钥对,所述公私钥对包括公钥和私钥。
可选的,得到所述预计算参数的过程包括:
所述车端集合更新所述紧急事件汇报系统的公开安全参数,随机选取参数,对所述公开安全参数进行预计算,得到所述预计算参数。
可选的,所述紧急事件的认证过程包括:
将所述紧急事件汇报给路侧单元,所述路侧单元向所述车端集合广播所述紧急事件和哈希值;所述哈希值用于表示所述车端集合对所述紧急事件的认证程度。
可选的,所述多重签名的获取过程包括:
将所述公钥发送给所述路侧单元,设置公钥集合,对所述紧急事件和所述公钥集合进行广播并签名;
对所述签名进行聚合运算,得到多重签名和聚合参数。
可选的,所述签名的公式为:r'i=(mi-m')*ski*ci+ri
其中,r'i为编号为i的车端的签名,ri,mi为编号为i的车端随机选取的参数,m'为紧急事件的哈希值,ski为编号为i的车端的私钥,ci为次指数。
可选的,所述聚合运算的公式为:
Figure RE-GDA0003665135130000031
Figure RE-GDA0003665135130000032
其中,R为多重签名,n为愿意参与紧急事件认证的车端的个数,r'i为编号为i的车端的签名,Y为聚合参数,yi为编号为i的车端随机选取的参数。
可选的,所述预计算参数的计算公式为:
Figure RE-GDA0003665135130000033
其中,Si和Mi为预计算参数,g为G的一个生成元,是全系统共用的公开安全参数,G为p阶的循环群,其中p为素数,M为紧急事件,pki为编号为i的车端的公钥。
可选的,所述哈希值的计算公式为:m'=h(M)
其中,m'为哈希值,h是任意常用的哈希函数,M为紧急事件。
本发明具有如下技术效果:
利用多重签名算法和次指数算法相结合,改进了传统方法中引起广播风暴和车端生成签名慢导致的计算资源浪费的问题,减少了路侧单元的通信压力和计算压力,避免了多重签名中常见的流氓密钥攻击。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例紧急事件汇报系统构建方法的流程框图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
如图1所示,本发明公开一种基于多重签名的车联网紧急事件汇报系统构建方法,包括:
步骤一,对紧急事件汇报系统进行初始化,得到车端集合的公私钥对和预计算参数,过程为:
紧急事件汇报系统初始化,当每个车端在接入车联网时,车端通过车载单元都会先向密钥管理机构注册来获得密钥管理机构颁发的公私钥对:
Figure RE-GDA0003665135130000041
其中,pki为编号为i的车端的公钥,ski为编号为i的车端的私钥,g为G的一个生成元,是全系统共用的公开安全参数,G为p阶的循环群,其中p为素数;
同时,车端更新紧急事件汇报系统的公开安全参数,每个车端会对公开安全参数中的部分参数进行预计算,包括:车端提前从公开安全参数域中随机选取参数ri,mi,继而通过以下公式进行预计算参数:
Figure RE-GDA0003665135130000051
式中,Si和Mi为预计算参数,ri、mi为编号为i的车端选取的参数,M 为紧急事件。
步骤2,基于所述公私钥对和预计算参数,得到紧急事件的认证信息,过程为:
当某个司机目击事故发生时,他控制车端将紧急消息汇报给路侧单元,进行简单而不可信的汇报。随后,路侧单元接到汇报,由于该汇报消息来源于单个车端,而单个司机可能会因为主观或者客观上的原因向路侧单元发出错误的紧急事件消息,主观上,该司机可能会想通过捏造不存在的事故消息,来让路侧单元对该路段进行交通调控,使自己的出行路线更加通畅;客观上,该司机可能看错或是输入错误的时间地点等因素,导致紧急事件内容出错,造成交通资源和救援资源的浪费,所以路侧单元要收到多个车端对该紧急事件的认证以后才相信这个紧急事件。为了能更快的收到对该紧急事件的其他认证消息,路侧单元向管辖区间内的车端广播紧急事件和对该紧急事件的哈希值,并询问有哪些车载单元愿意进行紧急消息的认证,得到紧急事件的认证信息,所述哈希值的计算公式为:m'=h(M),其中h是任意常用的哈希函数。
步骤3,整合所述认证信息,得到紧急事件的多重签名,过程为:
在车端收到紧急事件和对该紧急事件的哈希值后,愿意参与紧急事件认证的车端将自己的公钥发送给路侧单元,路侧单元设置公钥集合:L={pki}(i=1,…,n),其中,n表示愿意参与紧急事件认证的车端的个数,不失一般性,路侧单元选定车端集合中的一个车端N作为代表进行多重签名的聚合运算,路侧单元将车端N的信息和路侧单元设置的公钥集合广播出去,愿意参与紧急事件认证的车端收到广播消息后,采用次指数算法计算次指数:ci=h(L,pki),然后进行签名,签名公式为:
r′i=(mi-m')*ski*ci+ri
式中,h是任意常用的哈希函数,L为公钥集合,pki为编号为i的车端的公钥,ri、mi为编号为i的车端选取的参数,m'为紧急事件的哈希值,ski为私钥。
将各个参与紧急事件认证的车端签名r'i、之前预计算得到的秘密参数yi、小指数ci以及各个愿意参与紧急事件认证的车端公钥pki发送给车端N进行聚合,当车端N集齐所有愿意参与紧急事件认证的车端的签名后,车端N 进行聚合运算,聚合运算公式如下:
Figure RE-GDA0003665135130000061
Figure RE-GDA0003665135130000062
式中,R为多重签名,n为愿意参与紧急事件认证的车端的个数,Y为聚合参数。
路侧单元在等待车端N发送多重签名和聚合参数的同时,采用次指数算法计算次指数ci,然后计算聚合公钥:
Figure RE-GDA0003665135130000063
路侧单元接收到车端N发送的多重签名和聚合参数后,进行验证多重签名运算,公式如下:
gR*PKm′=y
若以上等式两边相等,则多重签名通过验证,表示公钥集合中的车端对紧急事件都表示认可,若以上等式两边不相等,则多重签名验证不通过,路侧单元终止本次紧急事件汇报。
步骤4,基于多重签名调控交通状态,完成系统构建;
紧急事件多重签名验证通过,路侧单元采用该验证通过的紧急事件信息对交通状态进行调控,包括:向驶近的车辆发出紧急讯息并警告潜在的交通堵塞,以及帮助公路管理部门迅速启动救援。
以上显示和描述了本发明的基本原理、主要特征和优点。本行业的技术人员应该了解,本发明不受上述实施例的限制,上述实施例和说明书中描述的只是说明本发明的原理,在不脱离本发明精神和范围的前提下,本发明还会有各种变化和改进,这些变化和改进都落入要求保护的本发明范围内。本发明要求保护范围由所附的权利要求书及其等效物界定。

Claims (9)

1.一种基于多重签名的车联网紧急事件汇报系统构建方法,其特征在于,包括以下步骤:
步骤1,对紧急事件汇报系统进行初始化,得到车端集合的公私钥对和预计算参数;
步骤2,基于所述公私钥对和预计算参数,得到紧急事件的认证信息;
步骤3,整合所述认证信息,得到紧急事件的多重签名;
步骤4,基于所述多重签名调控交通状态,完成系统构建。
2.根据权利要求1所述的一种基于多重签名的车联网紧急事件汇报系统构建方法,其特征在于,所述公私钥对的获取过程包括:
通过密钥管理机构注册获得所述密钥管理机构颁发的公私钥对,所述公私钥对包括公钥和私钥。
3.根据权利要求1所述的一种基于多重签名的车联网紧急事件汇报系统构建方法,其特征在于,得到所述预计算参数的过程包括:
所述车端集合更新所述紧急事件汇报系统的公开安全参数,随机选取参数,对所述公开安全参数进行预计算,得到所述预计算参数。
4.根据权利要求2所述的一种基于多重签名的车联网紧急事件汇报系统构建方法,其特征在于,所述紧急事件的认证过程包括:
将所述紧急事件汇报给路侧单元,所述路侧单元向所述车端集合广播所述紧急事件和哈希值;所述哈希值用于表示所述车端集合对所述紧急事件的认证程度。
5.根据权利要求4所述的一种基于多重签名的车联网紧急事件汇报系统构建方法,其特征在于,所述多重签名的获取过程包括:
将所述公钥发送给所述路侧单元,设置公钥集合,对所述紧急事件和所述公钥集合进行广播并签名;
对所述签名进行聚合运算,得到多重签名和聚合参数。
6.根据权利要求5所述的一种基于多重签名的车联网紧急事件汇报系统构建方法,其特征在于,
所述签名的公式为:r′i=(mi-m′)*ski*ci+ri
其中,r′i为编号为i的车端的签名,ri,mi为编号为i的车端随机选取的参数,m’为紧急事件的哈希值,ski为编号为i的车端的私钥,ci为次指数。
7.根据权利要求5所述的一种基于多重签名的车联网紧急事件汇报系统构建方法,其特征在于,
所述聚合运算的公式为:
Figure FDA0003559955920000021
Figure FDA0003559955920000022
其中,R为多重签名,n为愿意参与紧急事件认证的车端的个数,r′i为编号为i的车端的签名,Y为聚合参数,yi为编号为i的车端随机选取的参数。
8.根据权利要求1所述的一种基于多重签名的车联网紧急事件汇报系统构建方法,其特征在于,
所述预计算参数的计算公式为:
Figure FDA0003559955920000023
其中,Si和Mi为预计算参数,g为G的一个生成元,是全系统共用的公开安全参数,G为p阶的循环群,其中p为素数,M为紧急事件,pki为编号为i的车端的公钥。
9.根据权利要求4所述的一种基于多重签名的车联网紧急事件汇报系统构建方法,其特征在于,
所述哈希值的计算公式为:m′=h(M)
其中,m′为哈希值,h是任意常用的哈希函数,M为紧急事件。
CN202210290875.4A 2022-03-23 2022-03-23 一种基于多重签名的车联网紧急事件汇报系统构建方法 Active CN114727259B (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210290875.4A CN114727259B (zh) 2022-03-23 2022-03-23 一种基于多重签名的车联网紧急事件汇报系统构建方法
US18/150,345 US11792018B1 (en) 2022-03-23 2023-01-05 Method for constructing emergency reporting system of vehicle networking based on multi-signatures

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210290875.4A CN114727259B (zh) 2022-03-23 2022-03-23 一种基于多重签名的车联网紧急事件汇报系统构建方法

Publications (2)

Publication Number Publication Date
CN114727259A true CN114727259A (zh) 2022-07-08
CN114727259B CN114727259B (zh) 2022-10-11

Family

ID=82239793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210290875.4A Active CN114727259B (zh) 2022-03-23 2022-03-23 一种基于多重签名的车联网紧急事件汇报系统构建方法

Country Status (2)

Country Link
US (1) US11792018B1 (zh)
CN (1) CN114727259B (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110190957A (zh) * 2019-05-29 2019-08-30 西安邮电大学 基于无证书的多变量广播多重签名方法
US20210314748A1 (en) * 2020-04-01 2021-10-07 Lg Electronics Inc. Verification of messages using hash chaining
CN114154135A (zh) * 2022-02-07 2022-03-08 南京理工大学 基于国密算法的车联网通信安全认证方法、系统及设备

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106063161B (zh) * 2014-02-28 2019-04-19 Lg电子株式会社 用于在无线通信系统中生成低延迟信号的方法和装置
JP6024696B2 (ja) * 2014-03-27 2016-11-16 株式会社デンソー 通信装置
US9893825B1 (en) * 2016-12-20 2018-02-13 Ford Global Technologies, Llc System and method for sharing preset radio stations using a wireless network
US10360798B2 (en) * 2017-05-08 2019-07-23 Nokia Technologies Oy System and method for trust parameters in vehicle warning messages
US10565874B1 (en) * 2018-11-13 2020-02-18 Ford Global Technologies, Llc Method and apparatus for cellular communication redirect and relay
US11628788B2 (en) * 2019-03-25 2023-04-18 Micron Technology, Inc. Vehicle accident management using peer-to-peer networks and systems
US20200026289A1 (en) * 2019-09-28 2020-01-23 Ignacio J. Alvarez Distributed traffic safety consensus
US20210258751A1 (en) * 2020-02-18 2021-08-19 Lenovo (Singapore) Pte. Ltd. Responding to a signal indicating that an autonomous driving feature has been overridden by alerting plural vehicles
US11631061B2 (en) * 2020-07-27 2023-04-18 BlueOwl, LLC Method for creating and maintaining a distributed ledger of vehicle gas consumption and wear and tear information
US11984029B2 (en) * 2021-01-26 2024-05-14 Ford Global Technologies, Llc Method and apparatus for adaptive routing broadcasting and handling
US11405763B1 (en) * 2021-03-31 2022-08-02 Ford Global Technologies, Llc V2X road usage charging
US11536850B2 (en) * 2021-04-05 2022-12-27 Qualcomm Incorporated GNSS spoofing detection and recovery

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110190957A (zh) * 2019-05-29 2019-08-30 西安邮电大学 基于无证书的多变量广播多重签名方法
US20210314748A1 (en) * 2020-04-01 2021-10-07 Lg Electronics Inc. Verification of messages using hash chaining
CN114154135A (zh) * 2022-02-07 2022-03-08 南京理工大学 基于国密算法的车联网通信安全认证方法、系统及设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张亚玲等: "一个高效的基于身份和RSA的紧致多重数字签名方案", 《电子与信息学报》 *

Also Published As

Publication number Publication date
US11792018B1 (en) 2023-10-17
US20230308288A1 (en) 2023-09-28
CN114727259B (zh) 2022-10-11

Similar Documents

Publication Publication Date Title
CN109005542B (zh) 一种基于声誉系统的5g车联网快速消息认证方法
CN109698754B (zh) 基于环签名的车队安全管理系统及方法、车辆管理平台
CN109788482B (zh) 一种车联网环境下车辆间的消息匿名认证方法及系统
CN109412816B (zh) 一种基于环签名的车载网匿名通信系统及方法
Calandriello et al. On the performance of secure vehicular communication systems
CN108322486B (zh) 一种车联网云环境下面向多服务器架构的认证方法
US8452969B2 (en) Flexible broadcast authentication in resource-constrained systems: providing a tradeoff between communication and computational overheads
CN108964919A (zh) 基于车联网的具有隐私保护的轻量级匿名认证方法
Kang et al. Efficient authentication and access control of message dissemination over vehicular ad hoc network
CN109802956B (zh) 基于环签名的车载网匿名认证系统和方法、车辆通信平台
CN104394000A (zh) 一种车载网中基于假名验证公钥的批量认证方法
CN105847235A (zh) 一种车联网环境下基于身份的高效匿名批认证方法
CN110022542A (zh) 一种改进型基于条件隐私保护的匿名认证方法
CN104753683A (zh) 车联网中具有高效撤销的群签名方法
CN109861830B (zh) 一种面向vanet的高效条件匿名认证方法
CN108881225B (zh) 一种批量验证签名的车联网条件隐私保护方法
CN110099367A (zh) 基于边缘计算的车联网安全数据分享方法
CN112165711B (zh) 一种基于区块链的车载自组网群组密钥协商方法
CN110366176B (zh) 一种车载自组织网络的密钥协商方法
CN109640325B (zh) 基于可扩展式贡献组密钥协商的面向车队的安全管理方法
CN111092732B (zh) 一种车联网中基于无证书群签名的匿名认证方法
CN114727259B (zh) 一种基于多重签名的车联网紧急事件汇报系统构建方法
CN110493748B (zh) 一种基于雾的路况检测认证方法
Tsaur et al. DANS: A Secure and Efficient Driver-Abnormal Notification Scheme with I oT Devices Over I o V
CN110809253B (zh) 一种车载自组网的无证书聚合签名方法

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant