浏览全部资源
扫码关注微信
重庆邮电大学通信与信息工程学院,重庆 400065
[ "刘洁(1999- ),女,重庆邮电大学通信与信息工程学院硕士生,主要研究方向为车联网隐私保护和认证协议。" ]
[ "范馨月(1979- ),女,重庆邮电大学通信与信息工程学院副教授,主要研究方向为网络信息安全、信号处理。" ]
[ "何嘉辉(1999- ),男,重庆邮电大学通信与信息工程学院硕士生,主要研究方向为车联网隐私保护。" ]
收稿日期:2024-06-27,
修回日期:2024-09-01,
纸质出版日期:2024-09-20
移动端阅览
刘洁,范馨月,何嘉辉.一种条件隐私保护的V2G无证书高效聚合签密方案[J].电信科学,2024,40(09):88-98.
LIU Jie,FAN Xinyue,HE Jiahui.Efficient certificateless aggregate signcryption scheme with conditional privacy protection for V2G networks[J].Telecommunications Science,2024,40(09):88-98.
刘洁,范馨月,何嘉辉.一种条件隐私保护的V2G无证书高效聚合签密方案[J].电信科学,2024,40(09):88-98. DOI: 10.11959/j.issn.1000-0801.2024211.
LIU Jie,FAN Xinyue,HE Jiahui.Efficient certificateless aggregate signcryption scheme with conditional privacy protection for V2G networks[J].Telecommunications Science,2024,40(09):88-98. DOI: 10.11959/j.issn.1000-0801.2024211.
针对无证书签名方案不能满足消息机密性,大多数签密方案又存在安全功能不完善、效率低等问题,基于椭圆曲线加密技术提出一种适用于车辆到电网(vehicle-to-grid,V2G)的无证书聚合签密方案。车辆的部分公私钥由自身生成,避免了密钥托管问题。本地聚合器通过聚合解签密,提高了验证效率。通过假名机制提供条件隐私保护,保证合法车辆的匿名性与对恶意车辆的追溯和撤销。采用二元多项式实现车辆假名自主更新。在随机预言机模型下,证明了方案在自适应选择密文攻击下满足不可区分性(IND-CCA2),在自适应选择消息攻击下存在不可伪造性(EUF-CMA)。Scyther形式化分析工具证明了方案的安全性。性能分析表明,与近年签密方案相比,所提方案平均减少了约12.9%的通信开销和84.4%的聚合解签密计算开销,同时具有更高的安全要求。
To address the issue of message confidentiality in certificateless signature schemes and the shortcomings of most signcryption schemes
such as incomplete security functions and low efficiency
a certificateless aggregate signcryption scheme based on elliptic curve encryption technology was proposed for vehicle-to-grid (V2G) networks. Part of the vehicle’s public and private keys were generated by the vehicle itself
avoiding the problem of key escrow. Verification efficiency was improved by the local aggregator through aggregate unsigncryption. Conditional privacy protection was provided by a pseudonym mechanism
ensuring the anonymity of legitimate vehicles and the traceability and revocation of malicious vehicles. Binary polynomials were used to achieve autonomous updating of vehicle pseudonyms. In the random oracle model
the scheme was proven to meet indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2) and existential unforgeability under adaptive chosen message attacks (EUF-CMA). The security of the scheme was verified by the Scyther formal analysis tool. Performance analysis shows that
compared to recent signcryption schemes
the proposed scheme achieves an average reduction of approximately 12.9% in communication overhead and 84.4% in aggregate unsigncryption computation costs
while also meeting higher security requirements.
MWASILU F , JUSTO J J , KIM E K , et al . Electric vehicles and smart grid interaction: a review on vehicle to grid and renewable energy sources integration [J ] . Renewable and Sustainable Energy Reviews , 2014 ( 34 ): 501 - 516 .
BARBOSA M , FARSHIM P . Certificateless signcryption [C ] // Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security . New York : ACM Press , 2008 : 369 - 372 .
LI H X , WU C H , PANG L J . Completely anonymous certificateless multi-receiver signcryption scheme with sender traceability [J ] . Journal of Information Security and Applications , 2022 ( 71 ): 103384 .
李斌 , 吴坡 , 王丹 , 等 . 一种适用于电力终端设备的无证书在线/离线签密方案 [J ] . 计算机工程 , 2023 , 49 ( 12 ): 146 - 151, 160 .
LI B , WU P , WANG D , et al . A certificateless online/offline signcryption scheme for power terminal equipment [J ] . Computer Engineering , 2023 , 49 ( 12 ): 146 - 151, 160 .
刘德渊 , 张金全 , 张鑫 , 等 . 基于无证书签密的跨链身份认证方案 [J ] . 计算机应用 , 2024 . doi: 10.11772/j.issn.1001-9081.2023121824 http://dx.doi.org/10.11772/j.issn.1001-9081.2023121824 .
LIU D Y , ZHANG J Q , ZHANG X , et al . Cross-chain identity authentication scheme based on certificate-less signcryption [J ] . Journal of Computer Applications . 2024 . doi: 10.11772/j.issn.1001-9081.2023121824 http://dx.doi.org/10.11772/j.issn.1001-9081.2023121824 .
Al-RIYAMI S S , PATERSON K G . Certificateless public key cryptography [C ] // Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security . Berlin, Heidelberg : Springer Berlin Heidelberg , 2003 : 452 - 473 .
LIU S H , CHEN L Q , CHEN L Q , et al . Integrated and accountable data sharing for smart grids with fog and dual-blockchain assistance [J ] . IEEE Transactions on Industrial Informatics , 2023 , 20 ( 3 ): 4940 - 4952 .
YANG Y F , ZHANG L , ZHAO Y L , et al . Privacy-preserving aggregation-authentication scheme for safety warning system in fog-cloud based vanet [J ] . IEEE Transactions on Information Forensics and Security , 2022 ( 17 ): 317 - 331 .
YU H F , REN R T . Certificateless elliptic curve aggregate signcryption scheme [J ] . IEEE Systems Journal , 2022 , 16 ( 2 ): 2347 - 2354 .
DAI C , XU Z W . Pairing-free certificateless aggregate signcryption scheme for vehicular sensor networks [J ] . IEEE Internet of Things Journal , 2023 , 10 ( 6 ): 5063 - 5072 .
DOHARE I , SINGH K , AHMADIAN A , et al . Certificateless aggregated signcryption scheme(CLASS) for cloud-fog centric industry 4.0 [J ] . IEEE Transactions on Industrial Informatics , 2022 , 18 ( 9 ): 6349 - 6357 .
KOBLITZ N . Elliptic curve cryptosystems [J ] . Mathematics of Computation , 1987 , 48 ( 177 ): 203 - 209 .
WANG Y P , WANG X F , DAI H N , et al . A data reporting pro tocol with revocable anonymous authentication for edge-assisted intelligent transport systems [J ] . IEEE Transactions on Industrial Informatics , 2023 , 19 ( 6 ): 7835 - 7847 .
WU G , ZHANG F T , SHEN L M , et al . Certificateless aggregate signature scheme secures against fully chosen-key attacks [J ] . Information Sciences , 2020 ( 514 ): 288 - 301 .
ZHONG H , CHEN L , CUI J , et al . Secure and lightweight conditional privacy-preserving authentication for fog-based vehicular Ad Hoc networks [J ] . IEEE Internet of Things Journal , 2022 , 9 ( 11 ): 8485 - 8497 .
张应辉 , 李国腾 , 韩刚 , 等 . 5G车联网中安全高效的组播服务认证与密钥协商方案 [J ] . 电子与信息学报 , 2024 , 46 ( 2 ): 1 - 10 .
ZHANG Y H , LI G T , HAN G , et al . Secure and efficient authentication and key agreement scheme for multicast services in 5G vehicular to everything [J ] . Journal of Electronics&Information Technology . 2024 , 46 ( 2 ): 1 - 10 .
POINTCHEVAL D , STERN J . Security arguments for digital signatures and blind signatures [J ] . Journal of Cryptology , 2000 ( 13 ): 361 - 396 .
CREMERS C J F . The scyther tool: verification, falsification, and analysis of security protocols: tool paper [C ] // Proceedings of the International Conference on Computer Aided Verification . Berlin, Heidelberg : Springer Berlin Heidelberg , 2008 : 414 - 418 .
0
浏览量
8
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构