Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Certificateless signature scheme with strong privacy protection for internet of vehicles
Dong ZHU, Xinchun YIN, Jianting NING
Journal of Computer Applications    2022, 42 (10): 3091-3101.   DOI: 10.11772/j.issn.1001-9081.2021091630
Abstract350)   HTML9)    PDF (1079KB)(188)       Save

To guarantee the communication security of Internet of Vehicles (IoV) and reduce the overhead caused by updating vehicles private key frequently, firstly, the existing certificateless aggregate signature schemes were proved vulnerable to public key replacement attacks and malevolent Key Generation Center (KGC) attack at the same time. Secondly, a certificateless aggregate signature scheme with strong privacy protection and suitable for IoV was proposed. In the proposed scheme, by introducing pseudonymous identities, vehicles’ identities were hidden and trusted authority was capable of tracing malicious vehicles after the events. Meanwhile, vehicles’ pseudonymous identities and public keys were able to be updated dynamically with the change of the area in the proposed scheme. In this way, it was not only able to ensure the safety of vehicles’ trajectories, but also able to avoid the communication and storage overhead brought by frequent private key update effectively. Under the assumption of the Elliptic Curve Discrete Logarithm (ECDL) problem, security proof shows that the proposed scheme satisfies authentication and integrity under the random oracle model. Moreover, anonymity, traceability and strong privacy protection are also provided by the proposed scheme. At the same time, aggregate signature technology was used to realize the aggregated verification of vehicle signatures in the scheme, which reduced the computational cost of verifying the signature. Performance analysis shows that when the number of signatures contained in the aggregate signature is 100, the communication overhead of transmitting aggregated signatures by the proposed scheme is reduced by at least approximately 21.4 % compared with the other related schemes.

Table and Figures | Reference | Related Articles | Metrics
Routing policy management method for multi-ISP collaboration
Jing-hu Xu Ning Hu Pei-dong Zhu
Journal of Computer Applications   
Abstract1253)      PDF (615KB)(881)       Save
Inter-domain routing system consists of several Autonomous Systems (AS), and they are connected to each other and configure their own routing policy. Currently, due to the privacy of policy of Internet Service Providers (ISP) and flaws of design and realization of Boarder Gateway Protocol (BGP), there are a lot of flaws in collaborative configuration and security, along with apparent deficiency to deal with the problems just like conflict in routing policy and routing cheating. To handle the problems mentioned above, a distributed system for collaborative configuration and policy check between multi ISPs was put forward, in which privacy protection technology was applied in the information sharing process, so that multi ISPs could work collaboratively to check policy consistence violation faults that could not be found out by themselves alone.
Related Articles | Metrics
Using Gini-Index for feature selection in text categorization
Yong-Min LIN Wei-Dong ZHU
Journal of Computer Applications   
Abstract2029)      PDF (720KB)(1046)       Save
This paper used improved Gini-index for text feature selection, and constructed the measure function based on Gini-Index, then compared it to other four feature selection measures using two kinds of classifiers on two different document corpora. The result of experiments shows that its performance is comparable with other text feature selection approaches. However, it is perfect in the time complexity of algorithm.
Related Articles | Metrics