CN114727259B - 一种基于多重签名的车联网紧急事件汇报系统构建方法 - Google Patents
一种基于多重签名的车联网紧急事件汇报系统构建方法 Download PDFInfo
- Publication number
- CN114727259B CN114727259B CN202210290875.4A CN202210290875A CN114727259B CN 114727259 B CN114727259 B CN 114727259B CN 202210290875 A CN202210290875 A CN 202210290875A CN 114727259 B CN114727259 B CN 114727259B
- Authority
- CN
- China
- Prior art keywords
- emergency
- parameters
- public
- vehicle end
- multiple signatures
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000010276 construction Methods 0.000 title claims abstract description 11
- 238000004364 calculation method Methods 0.000 claims abstract description 13
- 230000001276 controlling effect Effects 0.000 claims abstract description 4
- 230000001105 regulatory effect Effects 0.000 claims abstract description 4
- 230000006855 networking Effects 0.000 claims abstract description 3
- 238000000034 method Methods 0.000 claims description 20
- 230000002776 aggregation Effects 0.000 claims description 13
- 238000004220 aggregation Methods 0.000 claims description 13
- 230000008569 process Effects 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 7
- 230000007246 mechanism Effects 0.000 claims description 6
- 238000006116 polymerization reaction Methods 0.000 claims description 4
- 238000004891 communication Methods 0.000 abstract description 5
- 239000002699 waste material Substances 0.000 description 4
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 206010039203 Road traffic accident Diseases 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/44—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Emergency Management (AREA)
- Environmental & Geological Engineering (AREA)
- Public Health (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Computing Systems (AREA)
- Power Engineering (AREA)
- Multimedia (AREA)
- Traffic Control Systems (AREA)
Abstract
本发明公开一种基于多重签名的车联网紧急事件汇报系统构建方法,包括:对紧急事件汇报系统进行初始化,得到车端集合的公私钥对和预计算参数;基于所述公私钥对和预计算参数,得到紧急事件的认证信息;整合所述认证信息,得到紧急事件多重签名;基于所述紧急事件多重签名调控交通状态,完成系统构建。实现了计算资源受限的车端高效生成签名功能,减少了路侧单元的通信压力和计算压力,能够有效防止其他方案中常见的流氓密钥攻击。
Description
技术领域
本发明涉及网络空间安全技术领域,特别涉及一种基于多重签名的车联网紧急事件汇报系统构建方法。
背景技术
VANET是一种基于道路沿线车辆和基础设施的可用性而动态建立的网络。通过VANET的无线通信,车辆之间可以共享不同种类的信息。当车辆目击紧急事件(如交通事故)时,车辆可以通过VANET网络将消息和自己对该消息的签名发送给路侧单元,路侧单元在收到消息并验证签名的有效性后,向其通信范围内的车辆广播该消息,从而达到避免二次事故的目的。然而,VANET的动态特性同时也带来了许多传统网络未有的问题,如:过多车端给路侧单元发送同一紧急消息引起的广播风暴问题和车端生成签名慢导致的计算资源浪费问题等。
多重签名技术是当今一项备受关注的技术,它允许一组签名者在同一个消息上产生一个共同的签名,这个签名可以被这组签名者的公钥验证,代表这一组签名者都认可该消息。多重签名中的签名长度与签名人数无关,且始终与单个签名的长度一致,这在很大程度上降低了信息传输量和通信压力。自多重签名的概念被提出以来,多重签名的方案设计得到了充分的研究,这些方案的安全性可规约于大整数分解问题、离散对数问题和格上困难问题等。
发明内容
为解决上述现有技术中所存在的传统方法引起广播风暴和车端生成签名慢导致的计算资源浪费的问题,本发明提供一种基于多重签名的车联网紧急事件汇报系统构建方法,利用多重签名算法和次指数算法相结合,减少了路侧单元的通信压力和计算压力,避免了多重签名中常见的流氓密钥攻击。
为了实现上述技术目的,本发明提供了一种基于多重签名的车联网紧急事件汇报系统构建方法,包括:
步骤1,对紧急事件汇报系统进行初始化,得到车端集合的公私钥对和预计算参数;
步骤2,基于所述公私钥对和预计算参数,得到紧急事件的认证信息;
步骤3,整合所述认证信息,得到紧急事件的多重签名;
步骤4,基于所述多重签名调控交通状态,完成系统构建。
可选的,所述公私钥对的获取过程包括:
通过密钥管理机构注册获得所述密钥管理机构颁发的公私钥对,所述公私钥对包括公钥和私钥。
可选的,得到所述预计算参数的过程包括:
所述车端集合更新所述紧急事件汇报系统的公开安全参数,随机选取参数,对所述公开安全参数进行预计算,得到所述预计算参数。
可选的,所述紧急事件的认证过程包括:
将所述紧急事件汇报给路侧单元,所述路侧单元向所述车端集合广播所述紧急事件和哈希值;所述哈希值用于表示所述车端集合对所述紧急事件的认证程度。
可选的,所述多重签名的获取过程包括:
将所述公钥发送给所述路侧单元,设置公钥集合,对所述紧急事件和所述公钥集合进行广播并签名;
对所述签名进行聚合运算,得到多重签名和聚合参数。
本发明具有如下技术效果:
利用多重签名算法和次指数算法相结合,改进了传统方法中引起广播风暴和车端生成签名慢导致的计算资源浪费的问题,减少了路侧单元的通信压力和计算压力,避免了多重签名中常见的流氓密钥攻击。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例紧急事件汇报系统构建方法的流程框图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
如图1所示,本发明公开一种基于多重签名的车联网紧急事件汇报系统构建方法,包括:
步骤一,对紧急事件汇报系统进行初始化,得到车端集合的公私钥对和预计算参数,过程为:
紧急事件汇报系统初始化,当每个车端在接入车联网时,车端通过车载单元都会先向密钥管理机构注册来获得密钥管理机构颁发的公私钥对:,其中,为编号为i的车端的公钥,为编号为i的车端的私钥,为的一个生成元,是全系统共用的公开安全参数,为阶的循环群,其中为素数;
步骤2,基于所述公私钥对和预计算参数,得到紧急事件的认证信息,过程为:
当某个司机目击事故发生时,他控制车端将紧急消息汇报给路侧单元,进行简单而不可信的汇报。随后,路侧单元接到汇报,由于该汇报消息来源于单个车端,而单个司机可能会因为主观或者客观上的原因向路侧单元发出错误的紧急事件消息,主观上,该司机可能会想通过捏造不存在的事故消息,来让路侧单元对该路段进行交通调控,使自己的出行路线更加通畅;客观上,该司机可能看错或是输入错误的时间地点等因素,导致紧急事件内容出错,造成交通资源和救援资源的浪费,所以路侧单元要收到多个车端对该紧急事件的认证以后才相信这个紧急事件。为了能更快的收到对该紧急事件的其他认证消息,路侧单元向管辖区间内的车端广播紧急事件和对该紧急事件的哈希值,并询问有哪些车载单元愿意进行紧急消息的认证,得到紧急事件的认证信息,所述哈希值的计算公式为:,其中是任意常用的哈希函数。
步骤3,整合所述认证信息,得到紧急事件的多重签名,过程为:
在车端收到紧急事件和对该紧急事件的哈希值后,愿意参与紧急事件认证的车端将自己的公钥发送给路侧单元,路侧单元设置公钥集合:,其中,n表示愿意参与紧急事件认证的车端的个数,不失一般性,路侧单元选定车端集合中的一个车端N作为代表进行多重签名的聚合运算,路侧单元将信息和路侧单元设置的公钥集合广播出去,愿意参与紧急事件认证的车端收到广播消息后,采用次指数算法计算次指数:然后进行签名,签名公式为:
将各个参与紧急事件认证的车端签名、之前预计算得到的秘密参数、以及各个愿意参与紧急事件认证的车端公钥发送给车端进行聚合, 当车端集齐所有愿意参与紧急事件认证的车端的签名后,车端进行聚合运算,聚合运算公式如下:
若以上等式两边相等,则多重签名通过验证,表示公钥集合中的车端对紧急事件都表示认可,若以上等式两边不相等,则多重签名验证不通过,路侧单元终止本次紧急事件汇报。
步骤4,基于多重签名调控交通状态,完成系统构建;
紧急事件多重签名验证通过,路侧单元采用该验证通过的紧急事件信息对交通状态进行调控,包括:向驶近的车辆发出紧急讯息并警告潜在的交通堵塞,以及帮助公路管理部门迅速启动救援。
以上显示和描述了本发明的基本原理、主要特征和优点。本行业的技术人员应该了解,本发明不受上述实施例的限制,上述实施例和说明书中描述的只是说明本发明的原理,在不脱离本发明精神和范围的前提下,本发明还会有各种变化和改进,这些变化和改进都落入要求保护的本发明范围内。本发明要求保护范围由所附的权利要求书及其等效物界定。
Claims (4)
1.一种基于多重签名的车联网紧急事件汇报系统构建方法,其特征在于,包括以下步骤:
步骤1,对紧急事件汇报系统进行初始化,得到车端集合的公私钥对和预计算参数;所述预计算参数的获取过程为:所述车端集合更新所述紧急事件汇报系统的公开安全参数,随机选取参数,对所述公开安全参数进行预计算,得到所述预计算参数;
步骤2,基于所述公私钥对和预计算参数,得到紧急事件的认证信息;所述紧急事件的认证信息获取过程为:将所述紧急事件汇报给路侧单元,所述路侧单元向所述车端集合广播所述紧急事件和哈希值;所述哈希值用于表示所述车端集合对所述紧急事件的认证程度;
步骤3,整合所述认证信息,得到紧急事件的多重签名;所述多重签名的获取过程为:将所述公钥发送给所述路侧单元,设置公钥集合,对所述紧急事件和所述公钥集合进行广播并签名;对所述签名进行聚合运算,得到多重签名和聚合参数,所述多重签名的计算公式为:
所述聚合参数的计算公式为:
所述路侧单元将车端的信息和所述路侧单元设置的所述公钥集合广播出去,愿意参与紧急事件认证的车端收到广播消息后,采用次指数算法计算次指数:,然后进行签名,签名公式为: 其中,是任意常用的哈希函数,为公钥集合,为编号为i的车端的公钥,为编号为i的车端选取的参数,为紧急事件的哈希值,为私钥;
所述路侧单元在等待车端发送所述多重签名和所述聚合参数的同时,采用次指数算法计算次指数,然后计算聚合公钥:,所述路侧单元接收到所述车端发送的所述多重签名和所述聚合参数后,进行验证多重签名运算,所述验证多重签名运算的公式为:
步骤4,基于所述多重签名调控交通状态,完成系统构建。
2.根据权利要求1所述的一种基于多重签名的车联网紧急事件汇报系统构建方法,其特征在于,所述公私钥对的获取过程包括:
通过密钥管理机构注册获得所述密钥管理机构颁发的公私钥对,所述公私钥对包括公钥和私钥。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210290875.4A CN114727259B (zh) | 2022-03-23 | 2022-03-23 | 一种基于多重签名的车联网紧急事件汇报系统构建方法 |
US18/150,345 US11792018B1 (en) | 2022-03-23 | 2023-01-05 | Method for constructing emergency reporting system of vehicle networking based on multi-signatures |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210290875.4A CN114727259B (zh) | 2022-03-23 | 2022-03-23 | 一种基于多重签名的车联网紧急事件汇报系统构建方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114727259A CN114727259A (zh) | 2022-07-08 |
CN114727259B true CN114727259B (zh) | 2022-10-11 |
Family
ID=82239793
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210290875.4A Active CN114727259B (zh) | 2022-03-23 | 2022-03-23 | 一种基于多重签名的车联网紧急事件汇报系统构建方法 |
Country Status (2)
Country | Link |
---|---|
US (1) | US11792018B1 (zh) |
CN (1) | CN114727259B (zh) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110190957A (zh) * | 2019-05-29 | 2019-08-30 | 西安邮电大学 | 基于无证书的多变量广播多重签名方法 |
CN114154135A (zh) * | 2022-02-07 | 2022-03-08 | 南京理工大学 | 基于国密算法的车联网通信安全认证方法、系统及设备 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10057906B2 (en) * | 2014-02-28 | 2018-08-21 | Lg Electronics Inc. | Method and apparatus for generating signal for low latency in wireless communication system |
JP6024696B2 (ja) * | 2014-03-27 | 2016-11-16 | 株式会社デンソー | 通信装置 |
US9893825B1 (en) * | 2016-12-20 | 2018-02-13 | Ford Global Technologies, Llc | System and method for sharing preset radio stations using a wireless network |
US10360798B2 (en) * | 2017-05-08 | 2019-07-23 | Nokia Technologies Oy | System and method for trust parameters in vehicle warning messages |
US10565874B1 (en) * | 2018-11-13 | 2020-02-18 | Ford Global Technologies, Llc | Method and apparatus for cellular communication redirect and relay |
US11628788B2 (en) * | 2019-03-25 | 2023-04-18 | Micron Technology, Inc. | Vehicle accident management using peer-to-peer networks and systems |
US20200026289A1 (en) * | 2019-09-28 | 2020-01-23 | Ignacio J. Alvarez | Distributed traffic safety consensus |
US20210258751A1 (en) * | 2020-02-18 | 2021-08-19 | Lenovo (Singapore) Pte. Ltd. | Responding to a signal indicating that an autonomous driving feature has been overridden by alerting plural vehicles |
US11811943B2 (en) * | 2020-04-01 | 2023-11-07 | Lg Electronics Inc. | Verification of messages using hash chaining |
US11631061B2 (en) * | 2020-07-27 | 2023-04-18 | BlueOwl, LLC | Method for creating and maintaining a distributed ledger of vehicle gas consumption and wear and tear information |
US11984029B2 (en) * | 2021-01-26 | 2024-05-14 | Ford Global Technologies, Llc | Method and apparatus for adaptive routing broadcasting and handling |
US11405763B1 (en) * | 2021-03-31 | 2022-08-02 | Ford Global Technologies, Llc | V2X road usage charging |
US11536850B2 (en) * | 2021-04-05 | 2022-12-27 | Qualcomm Incorporated | GNSS spoofing detection and recovery |
-
2022
- 2022-03-23 CN CN202210290875.4A patent/CN114727259B/zh active Active
-
2023
- 2023-01-05 US US18/150,345 patent/US11792018B1/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110190957A (zh) * | 2019-05-29 | 2019-08-30 | 西安邮电大学 | 基于无证书的多变量广播多重签名方法 |
CN114154135A (zh) * | 2022-02-07 | 2022-03-08 | 南京理工大学 | 基于国密算法的车联网通信安全认证方法、系统及设备 |
Non-Patent Citations (1)
Title |
---|
一个高效的基于身份和RSA的紧致多重数字签名方案;张亚玲等;《电子与信息学报》;20080915(第09期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
US11792018B1 (en) | 2023-10-17 |
US20230308288A1 (en) | 2023-09-28 |
CN114727259A (zh) | 2022-07-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109005542B (zh) | 一种基于声誉系统的5g车联网快速消息认证方法 | |
CN109698754B (zh) | 基于环签名的车队安全管理系统及方法、车辆管理平台 | |
Zhou et al. | Efficient certificateless conditional privacy-preserving authentication for VANETs | |
CN108471351B (zh) | 基于无证书聚合签名的车联网认证与密钥协商方法 | |
CN109412816B (zh) | 一种基于环签名的车载网匿名通信系统及方法 | |
US8452969B2 (en) | Flexible broadcast authentication in resource-constrained systems: providing a tradeoff between communication and computational overheads | |
CN108964919A (zh) | 基于车联网的具有隐私保护的轻量级匿名认证方法 | |
Kang et al. | Efficient authentication and access control of message dissemination over vehicular ad hoc network | |
CN104394000A (zh) | 一种车载网中基于假名验证公钥的批量认证方法 | |
CN110071797B (zh) | 基于混合上下文的假名变更车联网隐私保护认证的方法 | |
CN110022542A (zh) | 一种改进型基于条件隐私保护的匿名认证方法 | |
CN112165711B (zh) | 一种基于区块链的车载自组网群组密钥协商方法 | |
CN108881225B (zh) | 一种批量验证签名的车联网条件隐私保护方法 | |
CN104753683A (zh) | 车联网中具有高效撤销的群签名方法 | |
CN104158661A (zh) | 一种基于模糊身份的一次性公钥签密构造方法 | |
CN113610549B (zh) | 一种基于区块链的互联车辆认证系统和方法 | |
CN110493748B (zh) | 一种基于雾的路况检测认证方法 | |
CN117880813A (zh) | 一种基于区块链的车联网隐私保护认证方法 | |
CN113364598B (zh) | 一种车联网环境下隐私保护的批量认证方法 | |
Yelure et al. | SARP: secure routing protocol using anonymous authentication in vehicular Ad-hoc networks | |
CN114727259B (zh) | 一种基于多重签名的车联网紧急事件汇报系统构建方法 | |
CN116994423B (zh) | 车辆编队中轻量级、隐私保护的领队车辆选择系统及方法 | |
CN110809253B (zh) | 一种车载自组网的无证书聚合签名方法 | |
CN114666789B (zh) | 一种车联网场景下的容错聚合认证方法 | |
Wang et al. | Certificate-based anonymous authentication protocol for vehicular Ad-hoc network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |