浏览全部资源
扫码关注微信
1. 西安电子科技大学计算机科学与技术学院,陕西 西安 710071
2. 郑州轻工业大学计算机与通信工程学院,河南 郑州 450002
3. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
4. 西安电子科技大学陕西省网络与系统安全重点实验室, 陕西 西安 710071
[ "贺蕾(1980− ),男,山西平遥人,西安电子科技大学博士生,主要研究方向为应用密码学、无线网络安全等" ]
[ "马建峰(1963− ),男,陕西西安人,博士,西安电子科技大学教授、博士生导师,主要研究方向为应用密码学、无线网络安全、数据安全、移动智能系统安全等" ]
[ "魏大卫(1994− ),男,河北石家庄人,西安电子科技大学博士生,主要研究方向为无人机网络与系统安全等" ]
网络出版日期:2021-11,
纸质出版日期:2021-11-25
移动端阅览
贺蕾, 马建峰, 魏大卫. 面向无人机网络的属性代理签名方案[J]. 通信学报, 2021,42(11):87-96.
Lei HE, Jianfeng MA, Dawei WEI. Attribute-based proxy signature scheme for unmanned aerial vehicle networks[J]. Journal on communications, 2021, 42(11): 87-96.
贺蕾, 马建峰, 魏大卫. 面向无人机网络的属性代理签名方案[J]. 通信学报, 2021,42(11):87-96. DOI: 10.11959/j.issn.1000-436x.2021210.
Lei HE, Jianfeng MA, Dawei WEI. Attribute-based proxy signature scheme for unmanned aerial vehicle networks[J]. Journal on communications, 2021, 42(11): 87-96. DOI: 10.11959/j.issn.1000-436x.2021210.
为保护无人机网络中指挥机构发送给无人机的命令的完整性和认证性,需要使用数字签名对命令消息进行保护,该签名方案应保证无人机能及时收到签名,并且保护签名者的隐私。因此,提出了面向无人机网络的属性代理签名方案,并对其安全性进行了分析。所提方案在选择属性和选择消息攻击下具有存在的不可伪造性,而且能保护签名者的隐私。从计算开销和通信开销两方面对签名方案的效率进行了分析,并与其他相关签名方案进行了对比。结果表明,所提方案与其他方案在通信开销处于同一水平时具有更小的计算开销。
It is necessary to use digital signature scheme to protect integrity and authentication of commands sent by command agencies to unmanned aerial vehicle (UAV) in the UAV networks.Moreover
the signature scheme should ensure UAV can receive signature in time and protect privacy of signers.Therefore
an attribute-based proxy signature scheme for UAV networks was proposed and its security was analyzed.The proposed signature scheme has existential unforgeability under selective-attribute and chosen message attacks
and privacy of signers is protected.Its efficiency was analyzed in terms of computation costs and communication costs
and compared with other related signature schemes.The results indicate the proposed signature scheme has less computation costs when its communication costs are at the same level with other signature schemes.
GUPTA L , JAIN R , VASZKUN G . Survey of important issues in UAV communication networks [J ] . IEEE Communications Surveys & Tutorials , 2016 , 18 ( 2 ): 1123 - 1152 .
MAJI H K , PRABHAKARAN M , ROSULEK M . Attribute-based signatures [C ] // 2011 Cryptographers' Track at the RSA Conference . Berlin:Springer , 2011 : 376 - 392 .
LI J , KIM K . Hidden attribute-based signatures without anonymity revocation [J ] . Information Sciences , 2010 , 180 ( 9 ): 1681 - 1689 .
LI J , AU M H , SUSILO W , et al . Attribute-based signature and its applications [C ] // Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security . New York:ACM Press , 2010 : 60 - 69 .
莫若 , 马建峰 , 刘西蒙 , 等 . 一种支持树形访问结构的属性基可净化签名方案 [J ] . 电子学报 , 2017 , 45 ( 11 ): 2715 - 2720 .
MO R , MA J F , LIU X M , et al . An attribute-based sanitizable signature supporting dendritic access structure [J ] . Acta Electronica Sinica , 2017 , 45 ( 11 ): 2715 - 2720 .
GU K , JIA W J , WANG G J , et al . Efficient and secure attribute-based signature for monotone predicates [J ] . Acta Informatica , 2017 , 54 ( 5 ): 521 - 541 .
莫若 , 马建峰 , 刘西蒙 , 等 . 支持树形访问结构的多权威基于属性的签名方案 [J ] . 通信学报 , 2017 , 38 ( 7 ): 96 - 104 .
MO R , MA J F , LIU X M , et al . Multi-authority ABS supporting dendritic access structure [J ] . Journal on Communications , 2017 , 38 ( 7 ): 96 - 104 .
GUO R , SHI H X , ZHAO Q L , et al . Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems [J ] . IEEE Access , 2018 , 6 : 11676 - 11686 .
YANG R L , CHEN J G , LI S L . Secure and traceable attribute-based sequential aggregate signature [C ] // 2020 International Conference on Security,Privacy and Anonymity in Computation,Communication and Storage . Berlin:Springer , 2020 : 367 - 381 .
CHEN X F , LI J , HUANG X Y , et al . Secure outsourced attribute-based signatures [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 12 ): 3285 - 3294 .
MO R , MA J F , LIU X M , et al . EOABS:expressive outsourced attribute-based signature [J ] . Peer-to-Peer Networking and Applications , 2018 , 11 ( 5 ): 979 - 988 .
CUI H , DENG R H , LIU J K , et al . Server-aided attribute-based signature with revocation for resource-constrained industrial-Internet-of-things devices [J ] . IEEE Transactions on Industrial Informatics , 2018 , 14 ( 8 ): 3724 - 3732 .
XIONG H , BAO Y Y , NIE X Y , et al . Server-aided attribute-based signature supporting expressive access structures for industrial Internet of things [J ] . IEEE Transactions on Industrial Informatics , 2020 , 16 ( 2 ): 1013 - 1023 .
张应辉 , 贺江勇 , 郭瑞 , 等 . 工业物联网中服务器辅助且可验证的属性基签名方案 [J ] . 计算机研究与发展 , 2020 , 57 ( 10 ): 2177 - 2187 .
ZHANG Y H , HE J Y , GUO R , et al . Server-aided and verifiable attribute-based signature for Industrial Internet of things [J ] . Journal of Computer Research and Development , 2020 , 57 ( 10 ): 2177 - 2187 .
BAO Y Y , QIU W D , CHENG X C . Efficient and fine-grained signature for IIoT with resistance to key exposure [J ] . IEEE Internet of Things Journal , 2021 , 8 ( 11 ): 9189 - 9205 .
MAMBO M , USUDA K , OKAMOTO E . Proxy signatures for delegating signing operation [C ] // Proceedings of the 3rd ACM Conference on Computer and Communications Security . New York:ACM Press , 1996 : 48 - 57 .
HUANG X Y , SUSILO W , MU Y , et al . Proxy signature without random oracles [C ] // 2006 2nd International Conference on Mobile Ad-Hoc and Sensor Networks . Berlin:Springer , 2006 : 473 - 484 .
WU W , MU Y , SUSILO W , et al . Identity-based proxy signature from pairings [C ] // 2007 4th International Conference on Autonomic and Trusted Computing . Berlin:Springer , 2007 : 22 - 31 .
LIU X M , MA J F , XIONG J B , et al . Personal health records integrity verification using attribute-based proxy signature in cloud computing [C ] // 2013 6th International Conference on Internet and Distributed Computing Systems . Berlin:Springer , 2013 : 238 - 251 .
SUN C X , GUO Y F , LI Y L . One secure attribute-based proxy signature [J ] . Wireless Personal Communications , 2018 , 103 ( 2 ): 1273 - 1283 .
CARO A D , IOVINO V . jPBC:Java pairing based cryptography [C ] // 2011 IEEE Symposium on Computers and Communications . Piscataway:IEEE Press , 2011 : 850 - 855 .
0
浏览量
453
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构