浏览全部资源
扫码关注微信
北方工业大学 理学院,北京 100041
[ "张键红(1976-),男,北京人,北方工业大学副教授,主要研究方向为信息安全和密码学。" ]
[ "甄伟娜(1988-),女,河北邢台人,北方工业大学硕士生,主要研究方向为密码学。" ]
[ "邹建成(1966-),男,北京人,北方工业大学教授,主要研究方向为信息安全和图像处理。" ]
网络出版日期:2014-11,
纸质出版日期:2014-11-30
移动端阅览
张键红, 甄伟娜, 邹建成. 新的基于变色龙的车载通信安全与隐私保护[J]. 通信学报, 2014,35(Z2):191-195.
Jian-hong ZHANG, Wei-na ZHEN, Jian-cheng ZOU. New chameleon Hashing of secure and privacy-preserving vehicular communications[J]. Journal on communications, 2014, 35(Z2): 191-195.
张键红, 甄伟娜, 邹建成. 新的基于变色龙的车载通信安全与隐私保护[J]. 通信学报, 2014,35(Z2):191-195. DOI: 10.3969/j.issn.1000-436x.2014.z2.026.
Jian-hong ZHANG, Wei-na ZHEN, Jian-cheng ZOU. New chameleon Hashing of secure and privacy-preserving vehicular communications[J]. Journal on communications, 2014, 35(Z2): 191-195. DOI: 10.3969/j.issn.1000-436x.2014.z2.026.
在车载自组网(VANET)中许多服务和应用需要保护数据通信的安全,为提高驾驶的安全性和舒适性,一些与交通状况有关的信息就要被周期性地广播并分享给司机,如果用户的身份和信息没有隐私和安全的保证,攻击者就会通过收集和分析交通信息追踪他们感兴趣的车辆,因此,匿名消息身份验证是VANET中不可或缺的要求。另一方面
当车辆参与纠纷事件时,证书颁发机构能够恢复车辆的真实身份。为解决车载通信这一问题,郭等人在传统方案的基础上提出一种基于椭圆曲线的变色龙散列的隐私保护验证协议。虽然此方案较之前方案具有车辆身份可追踪性和高效率性,但分析表明此方案不满足匿名性。对郭等人的方案进行安全性分析并在此基础上做出改进。
Many services and applications in vehicular ad-hoc networks (VANET) require preserving and secure data communications.To improve driving safety and comfort
the traffic-related status information will be broadcasted regularly and shared among drivers.Without the security and privacy guarantee
attackers could track their interested vehicles by collecting and analyzing their traffic messages.Hence
anonymous message authentication is an essential requirement of VANET.On the other hand
when a vehicle is involved in a dispute event of warning message
the certificate authority should be able to recover the real identity of this vehicle.To deal with this issue
Guo
et al proposed a new privacy-preserving authentication protocol with authority traceability using elliptic curve based chameleon Hashing.Although this scheme has vehicle identification traceability and high computational efficiency than the previous plan
but analysis shows that the scheme does not meet the anonymity.The security of Guo's scheme is analyzed and improvement is made based on Guo’s protocol.
FIEBIG B . European traffic accidents and purposed solutions [A ] . Proc of the ITU-T Workshop on Standardization in Telecommunication for Motor Vehicles [C ] . 2003 . 24 - 25 .
PASSMANN C , BRENZEL C , MESCHENMOSER R . Wireless vehicle to vehicle warning system [A ] . SAE 2000 World Congress,Detroit [C ] . MI,USA , 2002 . 149 - 154 .
Internet ITS consortium [EB/OL ] . http://www.internetits.org,2006 http://www.internetits.org,2006 .
LIN X , SUN X , HO P H , et al . GSIS:a secure and privacy-preserving protocol for vehicular communications [J ] . IEEE Transactions on Vehicular Technology , 2007 , 56 ( 6 ): 3442 - 3456 .
STUDER A , SHI E , BAI F , et al . Tacking together efficient authentication,revocation,and privacy in VANETs [A ] . Proceeding of the 6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks(SECON) [C ] . 2009 . 1 - 9 .
LI R , LIN X , ZHU H , et al . ECPP:efficient conditional privacy preservation protocol for secure vehicular communications [A ] . Proceeding of the 27th Conference on Computer Communications (INFOCOM) [C ] . IEEE , 2008 . 1229 - 1237 .
PENG Y , ABICHAR Z , CHANG J . Roadside-aided routing(RAR) in vehicular networks [A ] . Proceeding of International Conference on Communications(ICC) [C ] . 2006 . 3602 - 3607 .
KRAWCZYK H , RABIN T . Chameleon hashing and signatures [A ] . Proceeding of Network and Distributed System Security 2000 [C ] . 2000 . 143 - 154 .
ATENIESE G , DE MEDEIROS B . Identity-based chameleon Hash and applications [J ] . Financial Cryptography , 2004 , 3 ( 10 ): 164 - 180 .
CHEN X , ZHANG F , KIM K . Chameleon hashing without key exposure [A ] . ISC 2004 [C ] . Springer-Verlag , 2004 . 87 - 98 .
GUO S , ZENG D , XIANG Y . Chameleon hashing for secure and privacy-preserving vehicular communications [J ] . IEEE Transactions on Parallel and Distributed Systems , 2013 , 25 ( 11 ): 2794 - 2803 .
BLAKE G S I , SMART N . Elliptic Curves in Cryptography [M ] . Cambridge University Press , 1999 .
WANG B Y,LI H,LIU X F,et al.Preserving identity privacy on multi-owner cloud data during public verification [EB/OL ] . http://www.wileyonlinelibrary.com http://www.wileyonlinelibrary.com .
张青波 , 陈彩云 , 陈鲁生 , 等 . 有限域上多项式形式的EIGamal体制及数字签名方案 [J ] . 通信学报 , 2005 , 26 ( 5 ): 69 - 72 .
ZHANG Q B , CHEN C Y , CHEN L S , et al . In the form of polynomial over finite field EIGamal system and digital signature scheme [J ] . Journal on Communications , 2005 , 26 ( 5 ): 69 - 72 .
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构