US20230308288A1 - Method for constructing emergency reporting system of vehicle networking based on multi-signatures - Google Patents

Method for constructing emergency reporting system of vehicle networking based on multi-signatures Download PDF

Info

Publication number
US20230308288A1
US20230308288A1 US18/150,345 US202318150345A US2023308288A1 US 20230308288 A1 US20230308288 A1 US 20230308288A1 US 202318150345 A US202318150345 A US 202318150345A US 2023308288 A1 US2023308288 A1 US 2023308288A1
Authority
US
United States
Prior art keywords
emergency
signatures
vehicle
public
parameters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US18/150,345
Other versions
US11792018B1 (en
Inventor
Anjia Yang
Xiaohu Chen
Jian Weng
Tao Li
Jiasi WENG
Jianan LIU
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan University
Original Assignee
Jinan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan University filed Critical Jinan University
Assigned to JINAN UNIVERSITY reassignment JINAN UNIVERSITY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHEN, XIAOHU, LI, TAO, LIU, Jianan, WENG, JIAN, WENG, Jiasi, YANG, Anjia
Publication of US20230308288A1 publication Critical patent/US20230308288A1/en
Application granted granted Critical
Publication of US11792018B1 publication Critical patent/US11792018B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the application relates to the technical field of cyberspace security, and in particular to a method for constructing an emergency reporting system of vehicle networking based on multi-signatures.
  • VANET is a dynamic network based on the availability of vehicles and infrastructure along the road. Through wireless communication of VANET, vehicles may share different kinds of information. When a vehicle witnesses an emergency (such as a traffic accident), the vehicle may send the message and its own signature to the roadside unit through VANET network. After receiving the message and verifying the validity of the signature, the roadside unit broadcasts the message to the vehicles within its communication range, thus achieving the purpose of avoiding secondary accidents.
  • the dynamic characteristics of VANET also bring many problems that traditional networks do not have, such as the broadcast storm caused by too many vehicles sending the same emergency message to the roadside unit and the waste of computing resources caused by the slow signature generation of vehicles.
  • Multi-signatures technology is a popular technology nowadays, which allows a group of signers to generate a common signature on the same message. This signature may be verified by the public key of this group of signers, which means that all the signers in this group approve the message.
  • the length of multi-signatures has nothing to do with the number of signatures, and is always consistent with the length of a single signature, which greatly reduces the information transmission and communication pressure. Since the concept of multi-signatures was put forward, the design of multi-signatures schemes has been fully studied, and the security of these schemes may be restricted to large integer decomposition problem, discrete logarithm problem and lattice difficulty problem.
  • the present application provides a method for constructing an emergency reporting system of vehicle networking based on multi-signatures.
  • multi-signatures algorithm By combining multi-signatures algorithm with sub-exponent algorithm, the communication pressure and computing pressure of roadside units are reduced, and the common rogue key attack in multi-signatures is avoided.
  • the present application provides a method for constructing an emergency reporting system of vehicle networking based on multi-signatures, which includes:
  • the obtaining process of the public-private key pair includes:
  • the obtaining process of the pre-calculation parameters includes:
  • the emergency authentication process includes:
  • the obtaining process of the multi-signatures includes:
  • R are multi-signatures
  • n is the number of vehicles willing to participate in emergency authentication
  • r i ′ is the signature of the vehicle numbered i
  • Y is the aggregation parameter
  • y i is the parameter randomly selected by the vehicle numbered i.
  • S i and M i are pre-calculation parameter
  • g is a generator of G, and is a public security parameter shared by the whole system
  • G is a cyclic group of order l, where l is a prime number, M is an emergency, and pk i is the public key of the vehicle numbered i.
  • m′ is the hash value, his any commonly used hash function and M is an emergency.
  • the application has the following technical effects.
  • FIG. 1 is a flowchart of a method for constructing an emergency reporting system according to an embodiment of the present application.
  • the application discloses a method for constructing an emergency reporting system of vehicle networking based on multi-signatures, which includes the following steps:
  • the signature r i ′ of each vehicle participating in the emergency authentication, the secret parameter y i calculated before, the small exponent c i and the public key pk i of each vehicle willing to participate in the emergency authentication are sent to the vehicle N for aggregation.
  • the vehicle N collects all the signatures of the vehicle willing to participate in the emergency authentication, the vehicle N performs aggregation operation, and the aggregation operation formula is as follows:

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Public Health (AREA)
  • Environmental & Geological Engineering (AREA)
  • Emergency Management (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Algebra (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computing Systems (AREA)
  • Power Engineering (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Traffic Control Systems (AREA)

Abstract

Disclosed is a method for constructing an emergency reporting system of vehicle networking based on multi-signatures, which comprises the following steps: initializing an emergency reporting system to obtain a public-private key pair and pre-calculation parameters of a vehicle set; obtaining authentication information of the emergency based on the public-private key pair and the pre-calculation parameters; integrating the authentication information to obtain multi-signatures of the emergency; and completing the system construction by regulating a traffic state based on the multi-signatures. The method realizes the efficient signature generation function of the vehicle with limited computing resources, reduces the communication pressure and computing pressure of roadside units, and may effectively prevent the common rogue key attacks in other schemes.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims priority to Chinese Patent Application No. 202210290875.4, filed on Mar. 23, 2022, the contents of which are hereby incorporated by reference.
  • TECHNICAL FIELD
  • The application relates to the technical field of cyberspace security, and in particular to a method for constructing an emergency reporting system of vehicle networking based on multi-signatures.
  • BACKGROUND
  • VANET is a dynamic network based on the availability of vehicles and infrastructure along the road. Through wireless communication of VANET, vehicles may share different kinds of information. When a vehicle witnesses an emergency (such as a traffic accident), the vehicle may send the message and its own signature to the roadside unit through VANET network. After receiving the message and verifying the validity of the signature, the roadside unit broadcasts the message to the vehicles within its communication range, thus achieving the purpose of avoiding secondary accidents. However, the dynamic characteristics of VANET also bring many problems that traditional networks do not have, such as the broadcast storm caused by too many vehicles sending the same emergency message to the roadside unit and the waste of computing resources caused by the slow signature generation of vehicles.
  • Multi-signatures technology is a popular technology nowadays, which allows a group of signers to generate a common signature on the same message. This signature may be verified by the public key of this group of signers, which means that all the signers in this group approve the message. The length of multi-signatures has nothing to do with the number of signatures, and is always consistent with the length of a single signature, which greatly reduces the information transmission and communication pressure. Since the concept of multi-signatures was put forward, the design of multi-signatures schemes has been fully studied, and the security of these schemes may be restricted to large integer decomposition problem, discrete logarithm problem and lattice difficulty problem.
  • SUMMARY
  • In order to solve the problems of broadcast storm caused by traditional methods in the prior art and the waste of computing resources caused by slow signature generation at the vehicle end, the present application provides a method for constructing an emergency reporting system of vehicle networking based on multi-signatures. By combining multi-signatures algorithm with sub-exponent algorithm, the communication pressure and computing pressure of roadside units are reduced, and the common rogue key attack in multi-signatures is avoided.
  • In order to achieve the above technical purpose, the present application provides a method for constructing an emergency reporting system of vehicle networking based on multi-signatures, which includes:
      • S1, initializing an emergency reporting system to obtain a public-private key pair and pre-calculation parameters of a vehicle set;
      • S2, obtaining authentication information of the emergency based on the public-private key pair and the pre-calculation parameters;
      • S3, integrating the authentication information to obtain multi-signatures of the emergency; and
      • S4, completing the system construction by regulating a traffic state based on the multi-signatures.
  • Optionally, the obtaining process of the public-private key pair includes:
      • the public-private key pair issued by a key management institution after registered in the key management institution, and the public-private key pair includes the public key and the private key.
  • Optionally, the obtaining process of the pre-calculation parameters includes:
      • the vehicle set updates the public safety parameters of the emergency reporting system, randomly selects parameters, and pre-calculates the public safety parameters to obtain the pre-calculation parameters.
  • Optionally, the emergency authentication process includes:
      • reporting the emergency to a roadside unit, and the roadside unit broadcasts the emergency and the hash value to the vehicle set; the hash value is used to indicate the authentication degree of the vehicle set to the emergency.
  • Optionally, the obtaining process of the multi-signatures includes:
      • sending the public key to the roadside unit, setting a public key set, broadcasting and the emergency and the public key set and then signing;
      • Perform aggregation operation on the signatures to obtain multi-signatures and aggregation parameters.
  • Optionally, the formula of the signature is as follows: ri′=(mi−m′)*ski*ci+ri,
      • where, ri′ is the signature of the vehicle numbered i, ri, mi are the randomly selected parameters of the vehicle numbered i, m′ is the hash value of the emergency, ski is the private key of the vehicle numbered i, and ci is the sub-exponent.
  • Optionally, the formula of the aggregation operation is as follows: R=Σi=1 n ri′,

  • Y=Π i=1 n y i (i=1, . . . ,n),
  • where, R are multi-signatures, n is the number of vehicles willing to participate in emergency authentication, ri′ is the signature of the vehicle numbered i, Y is the aggregation parameter, and yi is the parameter randomly selected by the vehicle numbered i.
  • Optionally, the calculation formula of the pre-calculation parameters is as follows: Si=gr i ; Mi=pki m i ,
  • where, Si and Mi are pre-calculation parameter, g is a generator of G, and is a public security parameter shared by the whole system, G is a cyclic group of order l, where l is a prime number, M is an emergency, and pki is the public key of the vehicle numbered i.
  • Optionally, the calculation formula of the hash value is m′=h(M),
  • where, m′ is the hash value, his any commonly used hash function and M is an emergency.
  • The application has the following technical effects.
  • By combining multi-signatures algorithm with sub-exponent algorithm, the problem of computing resource waste caused by broadcast storm and slow signature generation at vehicle end in traditional methods is improved, the communication pressure and computing pressure of roadside units are reduced, and the common rogue key attack in multi-signatures is avoided.
  • BRIEF DESCRIPTION OF THE DRAWING
  • In order to more clearly explain the embodiments of the present application or the technical solutions in the prior art, the following will briefly introduce the drawing that need to be used in the embodiments. Obviously, the drawing in the following description are only some embodiments of the present application. For those of ordinary skill in the art, other drawing may be obtained according to these drawing without any creative labor.
  • FIG. 1 is a flowchart of a method for constructing an emergency reporting system according to an embodiment of the present application.
  • DETAILED DESCRIPTION OF THE EMBODIMENTS
  • The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawing in the embodiments of the present application. Obviously, the described embodiments are only part of the embodiments of the present application, but not all of them. Based on the embodiment of the present application, all other embodiments obtained by ordinary technicians in the field without creative labor are within the scope of the present application.
  • As shown in FIG. 1 , the application discloses a method for constructing an emergency reporting system of vehicle networking based on multi-signatures, which includes the following steps:
  • S1, initializing the emergency reporting system to obtain the public-private key pairs and pre-calculation parameters of the vehicle set, and the process is as follows:
      • initializing the emergency reporting system, and when each vehicle connects to the vehicle networking, the vehicle will register with the key management institution through the on board unit to obtain the public-private key pairs issued by the key management institution: ski,pki=gsk i , where pki is the public key of the vehicle with number i, ski is the private key of the vehicle with number i, g is a generator of G, which is a public security parameter shared by the whole system, and G is a cyclic group of order l, where l is a prime number;
      • meanwhile, the vehicle updates the public safety parameters of the emergency reporting system, and each vehicle will pre-calculate some of the public safety parameters, including: the vehicle randomly selects parameters ri and mi from the public safety parameter field in advance, and then pre-calculates the parameters through the following formula: Si=gr i ; Mi=pki m i ,
      • where Si and Mi are pre-calculation parameters, ri and mi are the parameters selected by the vehicle numbered i, and M is an emergency.
  • S2, obtaining the authentication information of the emergency based on the public-private key pair and the pre-calculation parameters, and the process is as follows:
      • when a driver witnesses the accident, he controls the vehicle to report the emergency message to the roadside unit for a simple but unreliable report. Then, the roadside unit receives a report, because the report message comes from a single vehicle, and a single driver may send the wrong emergency message to the roadside unit for subjective or objective reasons. Subjectively, the driver may want to make the roadside unit control the traffic on the road section by fabricating the non-existent accident message, so as to make the travel route smoother; objectively, the driver may be wrong or input the wrong time and place and other factors, resulting in errors in the contents of the emergency, resulting in waste of traffic resources and rescue resources. Therefore, the roadside unit will not believe an emergency until it receives the certification of the emergency from multiple vehicles. In order to receive other authentication messages of the emergency quickly, the roadside unit broadcasts the emergency and the hash value of the emergency to the vehicles in the jurisdiction area, and asks which on board unit is willing to authenticate the emergency message to obtain the authentication information of the emergency. The calculation formula of the hash value is m′=h(M), where his any commonly used hash function.
  • S3, integrating the authentication information to obtain multi-signatures of emergencys, and the process is as follows:
      • after the vehicle receives the emergency and the hash value of the emergency, the vehicle willing to participate in the emergency authentication sends its own public key to the roadside unit, and the roadside unit sets the public key set: L={pki} (i=1, . . . , n), where n represents the number of vehicles willing to participate in emergency authentication, without losing generality. The roadside unit selects one vehicle N in the vehicle set as a representative to perform multi-signatures aggregation operation, and the roadside unit broadcasts the information and the set public key set by the roadside unit. After receiving the broadcast message, the vehicles willing to participate in emergency authentication calculate the sub-exponent by the sub-exponent algorithm: ci=h(L,pki), and then signing. The signature formula is: ri′=(mi−m′)*ski*ci+ri;
      • where h is any commonly used hash function, L is the set of public keys, pki is the public key of the vehicle numbered i, ri and mi are the parameters selected by the vehicle numbered i, mi is the hash value of the emergency, and ski is the private key.
  • The signature ri′ of each vehicle participating in the emergency authentication, the secret parameter yi calculated before, the small exponent ci and the public key pki of each vehicle willing to participate in the emergency authentication are sent to the vehicle N for aggregation. After the vehicle N collects all the signatures of the vehicle willing to participate in the emergency authentication, the vehicle N performs aggregation operation, and the aggregation operation formula is as follows:
  • R = i = 1 n r i Y = i = 1 n y i ( i = 1 , , n )
      • where R is multi-signatures, n is the number of vehicles willing to participate in emergency authentication, and Y is the aggregation parameter.
  • While waiting for the multi-signatures and aggregation parameters sent by the vehicle, the roadside unit calculates the sub-exponent by using the sub-exponent algorithm, and then calculates the aggregation public key: PK=Πi=1 n pki c i . After receiving the multi-signatures and aggregation parameters sent by the vehicle N, the roadside unit performs the multi-signatures verification operation, and the formula is as follows: gR*PKm′=Y,
      • if the two sides of the above equation are equal, the multi-signatures is verified, which means that all the vehicles in the public key set recognize the emergency; if the two sides of the above equation are not equal, the multi-signatures verification fails, and the roadside unit terminates this emergency report.
  • S4, regulating the traffic state based on multi-signatures to complete the system construction;
      • the emergency multi-signatures verification is passed, and the roadside unit uses the verified emergency information to regulate the traffic state, including: sending emergency messages to approaching vehicles and warning potential traffic jams, and helping highway management departments to quickly start rescue.
  • The above shows and describes the basic principle, main features and advantages of the present application. It should be understood by those skilled in the art that the application is not limited by the above-mentioned embodiments. The above-mentioned embodiments and descriptions only illustrate the principles of the application. Without departing from the spirit and scope of the application, there will be various changes and improvements of the application, all of which fall within the scope of the claimed application. The scope of that application is define by the appended claim and their equivalents.

Claims (4)

What is claimed is:
1. A method for constructing an emergency reporting system of vehicle networking based on multi-signatures, comprising the following steps:
S1, initializing the emergency reporting system to obtain a public-private key pair and pre-calculation parameters of a vehicle set; an obtaining process of the pre-calculation parameters is as follows: the vehicle set updates public safety parameters of the emergency reporting system, randomly selects the parameters, and pre-calculates the public safety parameters to obtain the pre-calculation parameters;
S2, obtaining authentication information of the emergency based on the public-private key pair and the pre-calculation parameters; the obtaining process of the authentication information of the emergency is as follows: reporting the emergency to a roadside unit; the roadside unit broadcasts the emergency and a hash value to the vehicle set; the hash value is used for indicating an authentication degree of the vehicle set to the emergency;
S3, integrating the authentication information to obtain the multi-signatures of the emergency; the obtaining process of the multi-signatures is as follows: sending a public key to the roadside unit, setting a public key set, broadcasting the emergency and the public key set and signing; performing an aggregation operation on the signatures to obtain multi-signatures and aggregation parameters, wherein the calculation formula of the multi-signatures is as follows:

R=Σ i=1 n r i′,
wherein n is a number of vehicles willing to participate in emergency authentication; ri′ is a signature of each vehicle participating in emergency authentication;
the formula for calculating the aggregation parameters is as follows:

Y=Π i=1 n y i (i=1, . . . ,n),
wherein yi is a secret parameter obtained by the pre-calculation;
the roadside unit broadcasts the information of the vehicle and the public key set set by the roadside unit, and a sub-exponent is calculated by a sub-exponent algorithm after the vehicle willing to participate in the emergency authentication receives the broadcast message as follows: ci=h(L,pki), and then signing, and the signature formula is as follows: ri′=(mi−m′)*ski*ci+ri, wherein h is a common hash function, L is the public key set, pki is the public key of a vehicle numbered i, ri and mi are the parameter selected by the vehicle numbered i, m′ is the hash value of the emergency, ski is the private key;
the roadside unit calculates the sub-exponent ci by using the sub-exponent algorithm while waiting for the vehicle to send the multi-signatures and the aggregation parameters, and then calculates an aggregation public key: PK=Πi=1 n pki c i ; the roadside unit performs a multi-signatures verification operation after receiving the multi-signatures and the aggregation parameters sent by the vehicle, and the formula of the multi-signatures verification operation is as follows:

g R *PK m′ =Y;
wherein R is the multi-signatures, Y is the aggregation parameters, and PK is the aggregation public key; and
S4, completing the system construction by regulating a traffic state based on the multi-signatures.
2. The method for constructing an emergency reporting system of vehicle networking based on multi-signatures according to claim 1, wherein the obtaining process of the public-private key pairs comprises:
the public-private key pair issued by a key management institution after registered in the key management institution, and the public-private key pair comprises the public key and the private key.
3. The method for constructing an emergency reporting system of vehicle networking based on multi-signatures according to claim 1, wherein
a calculation formula of the pre-calculation parameters is: Si=gr i ; Mi=pki m i ;
wherein, Si and Mi are the pre-calculation parameters, g is a generator of G, and is a public security parameter shared by the whole system; G is a cyclic group of order l, wherein l is a prime number, ri, mi are parameters randomly selected by the vehicle numbered i, m′ is a hash value of the emergency, M is the emergency, and pki is the public key of the vehicle numbered i.
4. The method for constructing an emergency reporting system of vehicle networking based on multi-signatures according to claim 1, wherein
a calculation formula of the hash value is m′=h(M);
wherein m′ is the hash value, h is a commonly used hash function, and M is the emergency.
US18/150,345 2022-03-23 2023-01-05 Method for constructing emergency reporting system of vehicle networking based on multi-signatures Active US11792018B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210290875.4 2022-03-23
CN202210290875.4A CN114727259B (en) 2022-03-23 2022-03-23 Internet of vehicles emergency reporting system construction method based on multiple signatures

Publications (2)

Publication Number Publication Date
US20230308288A1 true US20230308288A1 (en) 2023-09-28
US11792018B1 US11792018B1 (en) 2023-10-17

Family

ID=82239793

Family Applications (1)

Application Number Title Priority Date Filing Date
US18/150,345 Active US11792018B1 (en) 2022-03-23 2023-01-05 Method for constructing emergency reporting system of vehicle networking based on multi-signatures

Country Status (2)

Country Link
US (1) US11792018B1 (en)
CN (1) CN114727259B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150282065A1 (en) * 2014-03-27 2015-10-01 Denso Corporation Communication device
US9893825B1 (en) * 2016-12-20 2018-02-13 Ford Global Technologies, Llc System and method for sharing preset radio stations using a wireless network
US10057906B2 (en) * 2014-02-28 2018-08-21 Lg Electronics Inc. Method and apparatus for generating signal for low latency in wireless communication system
US20180322785A1 (en) * 2017-05-08 2018-11-08 Nokia Technologies Oy System and method for trust parameters in vehicle warning messages
US10565874B1 (en) * 2018-11-13 2020-02-18 Ford Global Technologies, Llc Method and apparatus for cellular communication redirect and relay
US20200307480A1 (en) * 2019-03-25 2020-10-01 Micron Technology, Inc. Vehicle accident management using peer-to-peer networks and systems
US20210258751A1 (en) * 2020-02-18 2021-08-19 Lenovo (Singapore) Pte. Ltd. Responding to a signal indicating that an autonomous driving feature has been overridden by alerting plural vehicles
US20220238020A1 (en) * 2021-01-26 2022-07-28 Ford Global Technologies, Llc Method and apparatus for adaptive routing broadcasting and handling
US11405763B1 (en) * 2021-03-31 2022-08-02 Ford Global Technologies, Llc V2X road usage charging

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110190957B (en) * 2019-05-29 2022-03-04 西安邮电大学 Certificateless multivariate broadcast multiple signature method
US20200026289A1 (en) * 2019-09-28 2020-01-23 Ignacio J. Alvarez Distributed traffic safety consensus
US11811943B2 (en) * 2020-04-01 2023-11-07 Lg Electronics Inc. Verification of messages using hash chaining
US11631061B2 (en) * 2020-07-27 2023-04-18 BlueOwl, LLC Method for creating and maintaining a distributed ledger of vehicle gas consumption and wear and tear information
US11536850B2 (en) * 2021-04-05 2022-12-27 Qualcomm Incorporated GNSS spoofing detection and recovery
CN114154135B (en) * 2022-02-07 2022-05-24 南京理工大学 Internet of vehicles communication security authentication method, system and equipment based on state cryptographic algorithm

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10057906B2 (en) * 2014-02-28 2018-08-21 Lg Electronics Inc. Method and apparatus for generating signal for low latency in wireless communication system
US20150282065A1 (en) * 2014-03-27 2015-10-01 Denso Corporation Communication device
US9893825B1 (en) * 2016-12-20 2018-02-13 Ford Global Technologies, Llc System and method for sharing preset radio stations using a wireless network
US20180322785A1 (en) * 2017-05-08 2018-11-08 Nokia Technologies Oy System and method for trust parameters in vehicle warning messages
US10565874B1 (en) * 2018-11-13 2020-02-18 Ford Global Technologies, Llc Method and apparatus for cellular communication redirect and relay
US20200307480A1 (en) * 2019-03-25 2020-10-01 Micron Technology, Inc. Vehicle accident management using peer-to-peer networks and systems
US20210258751A1 (en) * 2020-02-18 2021-08-19 Lenovo (Singapore) Pte. Ltd. Responding to a signal indicating that an autonomous driving feature has been overridden by alerting plural vehicles
US20220238020A1 (en) * 2021-01-26 2022-07-28 Ford Global Technologies, Llc Method and apparatus for adaptive routing broadcasting and handling
US11405763B1 (en) * 2021-03-31 2022-08-02 Ford Global Technologies, Llc V2X road usage charging

Also Published As

Publication number Publication date
US11792018B1 (en) 2023-10-17
CN114727259B (en) 2022-10-11
CN114727259A (en) 2022-07-08

Similar Documents

Publication Publication Date Title
Ali et al. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs
CN109698754B (en) Fleet safety management system and method based on ring signature and vehicle management platform
Zhang et al. Edge computing-based privacy-preserving authentication framework and protocol for 5G-enabled vehicular networks
CN109005542B (en) 5G Internet of vehicles rapid message authentication method based on reputation system
CN109412816B (en) Anonymous communication system and method for vehicle-mounted network based on ring signature
CN109788482B (en) Method and system for anonymous authentication of messages between vehicles in Internet of vehicles environment
US8452969B2 (en) Flexible broadcast authentication in resource-constrained systems: providing a tradeoff between communication and computational overheads
Zhou et al. Efficient certificateless conditional privacy-preserving authentication for VANETs
CN109802956B (en) Anonymous vehicle-mounted network authentication system and method based on ring signature and vehicle communication platform
Tajeddine et al. A privacy-preserving trust model for VANETs
CN102170352B (en) Method of using ECDSA with winternitz one time signature
Kang et al. Efficient authentication and access control of message dissemination over vehicular ad hoc network
CN104753683A (en) Group signature method with efficient revocation in vehicle networking
CN109861830B (en) VANET-oriented efficient condition anonymous authentication method
CN108881225B (en) Vehicle networking condition privacy protection method for verifying signatures in batches
CN110022542A (en) A kind of anonymous authentication method of the modified based on condition secret protection
CN110493748B (en) Fog-based road condition detection and authentication method
CN113364598B (en) Batch authentication method for privacy protection in Internet of vehicles environment
US11792018B1 (en) Method for constructing emergency reporting system of vehicle networking based on multi-signatures
Chen et al. A multisignature-based secure and OBU-friendly emergency reporting scheme in VANET
CN111885545B (en) Method for tracking selfish node based on V2V cooperative transmission authentication
CN115412907B (en) Block chain-based VANETs anonymous authentication method, device and equipment
CN113610549B (en) Block chain-based interconnected vehicle authentication system and method
CN102256248B (en) Scheme for managing Ad hoc group key
CN113556730A (en) Method and system for protecting identity privacy of Internet of vehicles and storage medium

Legal Events

Date Code Title Description
AS Assignment

Owner name: JINAN UNIVERSITY, CHINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YANG, ANJIA;CHEN, XIAOHU;WENG, JIAN;AND OTHERS;REEL/FRAME:062283/0359

Effective date: 20230105

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE