Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (10): 3091-3101.DOI: 10.11772/j.issn.1001-9081.2021091630
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
Dong ZHU1, Xinchun YIN1,2, Jianting NING3
Received:
2021-09-16
Revised:
2021-12-24
Accepted:
2022-01-13
Online:
2022-04-15
Published:
2022-10-10
Contact:
Xinchun YIN
About author:
ZHU Dong,born in 1996, M. S. candidate. His research interests include certificateless signature, communication security of internet of vehicles.Supported by:
朱栋1, 殷新春1,2, 宁建廷3
通讯作者:
殷新春
作者简介:
第一联系人:朱栋(1996—),男,江苏盐城人,硕士研究生,主要研究方向:无证书签名、车联网通信安全基金资助:
CLC Number:
Dong ZHU, Xinchun YIN, Jianting NING. Certificateless signature scheme with strong privacy protection for internet of vehicles[J]. Journal of Computer Applications, 2022, 42(10): 3091-3101.
朱栋, 殷新春, 宁建廷. 车联网中具有强隐私保护的无证书签名方案[J]. 《计算机应用》唯一官方网站, 2022, 42(10): 3091-3101.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021091630
符号 | 含义 | 符号 | 含义 |
---|---|---|---|
系统主密钥 | TA的私钥 | ||
路边单元 | 对称加/解密算法 | ||
对称加/解密算法的密钥 | 车辆 | ||
车辆 | 伪身份的有效期 | ||
生成假名身份的时间戳 | 车辆 | ||
部分私钥的转换值 | 车辆 | ||
公钥的转换值 | 车辆 | ||
车辆 | 签名的时间戳 | ||
车联网注册车辆数 | |||
聚合签名包含的签名数 | 请求消息 |
Tab. 1 Some symbols used in the proposed scheme
符号 | 含义 | 符号 | 含义 |
---|---|---|---|
系统主密钥 | TA的私钥 | ||
路边单元 | 对称加/解密算法 | ||
对称加/解密算法的密钥 | 车辆 | ||
车辆 | 伪身份的有效期 | ||
生成假名身份的时间戳 | 车辆 | ||
部分私钥的转换值 | 车辆 | ||
公钥的转换值 | 车辆 | ||
车辆 | 签名的时间戳 | ||
车联网注册车辆数 | |||
聚合签名包含的签名数 | 请求消息 |
密码运算 | 含义 | 运行时间/ms |
---|---|---|
一次双线性配对运算所需的时间 | 4.211 0 | |
一次双线性配对乘法运算所需的时间 | 1.709 0 | |
一次双线性配对加法运算所需的时间 | 0.007 1 | |
一次椭圆曲线乘法运算所需的时间 | 0.442 0 | |
一次椭圆曲线加法运算所需的时间 | 0.001 8 | |
一次映射到点的哈希运算所需的时间 | 4.406 0 |
Tab. 2 Operation time
密码运算 | 含义 | 运行时间/ms |
---|---|---|
一次双线性配对运算所需的时间 | 4.211 0 | |
一次双线性配对乘法运算所需的时间 | 1.709 0 | |
一次双线性配对加法运算所需的时间 | 0.007 1 | |
一次椭圆曲线乘法运算所需的时间 | 0.442 0 | |
一次椭圆曲线加法运算所需的时间 | 0.001 8 | |
一次映射到点的哈希运算所需的时间 | 4.406 0 |
方案类型 | 曲线类型 | 配对 | 循环群 | 有限域/bit | 群元素/bit |
---|---|---|---|---|---|
Bilinear Pairing | |||||
ECC | — |
Tab. 3 Length of parameters in Bilinear Pairing and ECC
方案类型 | 曲线类型 | 配对 | 循环群 | 有限域/bit | 群元素/bit |
---|---|---|---|---|---|
Bilinear Pairing | |||||
ECC | — |
方案 | 签名算法 | 验证算法 | 签名+验证/ms | 聚合验证算法 |
---|---|---|---|---|
文献[ | 25.584 0 | |||
文献[ | 35.910 0 | |||
文献[ | 1.771 6 | |||
文献[ | 1.771 6 | |||
文献[ | 1.327 8 | |||
文献[ | 3.099 4 | |||
本文方案 | 2.219 0 |
Tab. 4 Comparison of computational cost for different schemes
方案 | 签名算法 | 验证算法 | 签名+验证/ms | 聚合验证算法 |
---|---|---|---|---|
文献[ | 25.584 0 | |||
文献[ | 35.910 0 | |||
文献[ | 1.771 6 | |||
文献[ | 1.771 6 | |||
文献[ | 1.327 8 | |||
文献[ | 3.099 4 | |||
本文方案 | 2.219 0 |
方案 | 签名长度 | 聚合签名长度 | 传输单个签名 | 传输聚合签名 |
---|---|---|---|---|
文献[ | ||||
文献[ | ||||
文献[ | ||||
文献[ | ||||
文献[ | — | — | ||
文献[ | — | — | ||
本文方案 |
Tab. 5 Comparison of communication overhead for different schemes
方案 | 签名长度 | 聚合签名长度 | 传输单个签名 | 传输聚合签名 |
---|---|---|---|---|
文献[ | ||||
文献[ | ||||
文献[ | ||||
文献[ | ||||
文献[ | — | — | ||
文献[ | — | — | ||
本文方案 |
方案 | 认证性 | 匿名性 | 可追踪性 | 隐私保护 | 聚合/批处理 | 私钥频繁更新 | 存储代价 | 抵抗Type I攻击 | 抵抗Type II攻击 |
---|---|---|---|---|---|---|---|---|---|
文献[ | √ | √ | √ | 弱 | 聚合 | 否 | 小 | √ | × |
文献[ | √ | √ | √ | 强 | 聚合 | 是 | 大 | √ | √ |
文献[ | √ | √ | √ | 弱 | 聚合 | 否 | 小 | × | √ |
文献[ | √ | √ | √ | 强 | 聚合 | 是 | 大 | √ | × |
文献[ | √ | √ | √ | 强 | 批处理 | 是 | 大 | √ | × |
文献[ | √ | √ | √ | 弱 | 批处理 | 否 | 小 | √ | √ |
本文方案 | √ | √ | √ | 强 | 聚合 | 否 | 小 | √ | √ |
Tab. 6 Comparison of security performance for different schemes
方案 | 认证性 | 匿名性 | 可追踪性 | 隐私保护 | 聚合/批处理 | 私钥频繁更新 | 存储代价 | 抵抗Type I攻击 | 抵抗Type II攻击 |
---|---|---|---|---|---|---|---|---|---|
文献[ | √ | √ | √ | 弱 | 聚合 | 否 | 小 | √ | × |
文献[ | √ | √ | √ | 强 | 聚合 | 是 | 大 | √ | √ |
文献[ | √ | √ | √ | 弱 | 聚合 | 否 | 小 | × | √ |
文献[ | √ | √ | √ | 强 | 聚合 | 是 | 大 | √ | × |
文献[ | √ | √ | √ | 强 | 批处理 | 是 | 大 | √ | × |
文献[ | √ | √ | √ | 弱 | 批处理 | 否 | 小 | √ | √ |
本文方案 | √ | √ | √ | 强 | 聚合 | 否 | 小 | √ | √ |
1 | ABBOUD K, OMAR H, ZHUANG W H. Interworking of DSRC and cellular network technologies for V2X communications: a survey[J]. IEEE Transactions on Vehicular Technology, 2016, 65(12): 9457-9470. 10.1109/tvt.2016.2591558 |
2 | WANG P F, DI B Y, ZHANG H L, et al. Cellular V2X communications in unlicensed spectrum: harmonious coexistence with VANET in 5G systems[J]. IEEE Transactions on Wireless Communications, 2018, 17(8): 5212-5224. 10.1109/twc.2018.2839183 |
3 | 熊玲,李发根,刘志才. 车联网环境下基于区块链技术的条件隐私消息认证方案[J]. 计算机科学, 2020, 47(11): 55-59. 10.11896/jsjkx.200500116 |
XIONG L, LI F G, LIU Z C. Conditional privacy-preserving authentication scheme based on blockchain for vehicular ad hoc networks[J]. Computer Science, 2020, 47(11): 55-59. 10.11896/jsjkx.200500116 | |
4 | 吴黎兵,谢永,张宇波. 面向车联网高效安全的消息认证方案[J]. 通信学报, 2016, 37(11): 1-10. 10.11959/j.issn.1000-436x.2016211 |
WU L B, XIE Y, ZHANG Y B. Efficient and secure message authentication scheme for VANET[J]. Journal on Communications, 2016, 37(11): 1-10. 10.11959/j.issn.1000-436x.2016211 | |
5 | 王春东,罗婉薇,莫秀良,等. 车联网互信认证与安全通信综述[J]. 计算机科学, 2020, 47(11): 1-9. 10.11896/jsjkx.200800024 |
WANG C D, LUO W W, MO X L, et al. Survey on mutual trust authentication and secure communication of internet of vehicles[J]. Computer Science, 2020, 47(11): 1-9. 10.11896/jsjkx.200800024 | |
6 | TZENG S F, HORNG S J, LI T R, et al. Enhancing security and privacy for identity-based batch verification scheme in VANETs[J]. IEEE Transactions on Vehicular Technology, 2017, 66(4): 3235-3248. 10.1109/tvt.2015.2406877 |
7 | HE D B, ZEADALLY S, XU B W, et al. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(12): 2681-2691. 10.1109/tifs.2015.2473820 |
8 | 谢永,吴黎兵,张宇波,等. 面向车联网的多服务器架构的匿名双向认证与密钥协商协议[J]. 计算机研究与发展, 2016, 53(10): 2323-2333. 10.7544/issn1000-1239.2016.20160428 |
XIE Y, WU L B, ZHANG Y B, et al. Anonymous mutual authentication and key agreement protocol in multi-server architecture for VANETs[J]. Journal of Computer Research and Development, 2016, 53(10): 2323-2333. 10.7544/issn1000-1239.2016.20160428 | |
9 | LI J L, CHOO K K R, ZHANG W G, et al. EPA-CPPA: an efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J]. Vehicular Communications, 2018, 13: 104-113. 10.1016/j.vehcom.2018.07.001 |
10 | MAHANTA H J, AZAD A K, KHAN A K. Differential power analysis: attacks and resisting techniques[M]// MANDAL J K, SATAPATHY S C, KUMAR SANYAL M, et al. Information Systems Design and Intelligent Applications: Proceedings of Second International Conference INDIA 2015, Volume 2, AISC 340. New Delhi: Springer, 2015:349-358. 10.1007/978-81-322-2247-7_36 |
11 | HORNG S J, TZENG S F, HUANG P H, et al. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks[J]. Information Sciences, 2015, 317: 48-66. 10.1016/j.ins.2015.04.033 |
12 | LI J G, YUAN H, ZHANG Y C. Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks[EB/OL]. (2016-07-13) [2021-12-18].. 10.1016/j.ins.2015.04.033 |
13 | ZHONG H, HAN S S, CUI J, et al. Privacy-preserving authentication scheme with full aggregation in VANET[J]. Information Sciences, 2019, 476: 211-221. 10.1016/j.ins.2018.10.021 |
14 | MEI Q, XIONG H, CHEN J H, et al. Efficient certificateless aggregate signature with conditional privacy preservation in IoV[J]. IEEE System Journal, 2020, 15(1): 245-256. 10.1109/jsyst.2020.2966526 |
15 | THUMBUR G, RAO G S, REDDY P V, et al. Efficient and secure certificateless aggregate signature-based authentication scheme for vehicular ad hoc networks[J]. IEEE Internet of Things Journal, 2021, 8(3): 1908-1920. 10.1109/jiot.2020.3019304 |
16 | CUI J, ZHANG J, ZHONG H, et al. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks[J]. Information Sciences, 2018, 451/452: 1-15. 10.1016/j.ins.2018.03.060 |
17 | KAMIL I A, OGUNDOYIN S O. An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks[J]. Journal of Information Security and Applications, 2019, 44: 184-200. 10.1016/j.jisa.2018.12.004 |
18 | ALI I, CHEN Y, ULLAH N, et al. An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs[J]. IEEE Transactions on Vehicular Technology, 2021, 70(2): 1278-1291. 10.1109/tvt.2021.3050399 |
19 | GAYATHRI N B, THUMBUR G, REDDY P V, et al. Efficient pairing-free certificateless authentication scheme with batch verification for vehicular ad-hoc networks[J]. IEEE Access, 2018, 6: 31808-31819. 10.1109/access.2018.2845464 |
20 | 王大星,滕济凯. 车载网中可证安全的无证书聚合签名算法[J]. 电子与信息学报, 2018, 40(1): 11-17. 10.11999/JEIT170340 |
WANG D X, TENG J K. Probably secure certificateless aggregate signature algorithm for vehicular ad hoc network[J]. Journal of Electronics and Information Technology, 2018, 40(1): 11-17. 10.11999/JEIT170340 | |
21 | 谢永,李香,张松松.等 . 一种可证安全的车联网无证书聚合签名改进方案[J]. 电子与信息学报, 2020, 42(5): 1125-1131. |
XIE Y, LI X, ZHANG S S, et al. An improved provable secure certificateless aggregation signature scheme for Vehicular Ad hoc NETworks[J]. Journal of Electronics and Information Technology, 2020, 42(5): 1125-1131. | |
22 | 张文芳,雷雨婷,王小敏,等. 面向云服务的安全高效无证书聚合签名车联网认证密钥协商协议[J]. 电子学报, 2020, 48(9): 1814-1823. 10.3969/j.issn.0372-2112.2020.09.020 |
ZHANG W F, LEI Y T, WANG X M, et al. Secure and efficient authentication and key agreement protocol using certificateless aggregate signature for cloud service oriented VANET[J]. Acta Electronica Sinica, 2020, 48(9): 1814-1823. 10.3969/j.issn.0372-2112.2020.09.020 | |
23 | ZHAO Y N, HOU Y Z, WANG L L, et al. An efficient certificateless aggregate signature scheme for the internet of vehicles[J]. Transactions on Emerging Telecommunications Technologies, 2020, 31(5): No.e3708. 10.1002/ett.3708 |
24 | 张振超,刘亚丽,殷新春,等. 无证书签名方案的分析及改进[J]. 密码学报, 2020, 7(3): 389-403. 10.13868/j.cnki.jcr.000375 |
ZHANG Z C, LIU Y L, YIN X C, et al. Analysis and improvement of certificateless signature schemes[J]. Journal of Cryptologic Research, 2020, 7(3): 389-403. 10.13868/j.cnki.jcr.000375 | |
25 | 李艳平,聂好好,周彦伟,等. 新的可证明安全的无证书聚合签名方案[J]. 密码学报, 2015, 2(6): 526-535. 10.13868/j.cnki.jcr.0099 |
LI Y P, NIE H H, ZHOU Y W, et al. A novel and provably secure certificateless aggregate signature scheme[J]. Journal of Cryptologic Research, 2015, 2(6): 526-535. 10.13868/j.cnki.jcr.0099 | |
26 | POINTCHEVAL D, STERN J. Security proofs for signature schemes[C]// Proceedings of the 1996 Annual International Conference on Theory and Applications of Cryptographic Techniques, LNCS 1070. Berlin: Springer, 1996: 387-398. |
[1] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[2] | Xiaoyan ZHAO, Wei HAN, Junna ZHANG, Peiyan YUAN. Collaborative offloading strategy in internet of vehicles based on asynchronous deep reinforcement learning [J]. Journal of Computer Applications, 2024, 44(5): 1501-1510. |
[3] | Xin LI, Liyong BAO, Hongwei DING, Zheng GUAN. MAC layer scheduling strategy of roadside units based on MEC server priority service [J]. Journal of Computer Applications, 2024, 44(4): 1227-1235. |
[4] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[5] | Jinbo LI, Ping ZHANG, Ji ZHANG, Muhua LIU. Identity-based ring signature scheme on number theory research unit lattice [J]. Journal of Computer Applications, 2023, 43(9): 2798-2805. |
[6] | Ruiqi FENG, Leilei WANG, Xiang LIN, Jinbo XIONG. Software Guard Extensions-based secure data processing framework for traffic monitoring of internet of vehicles [J]. Journal of Computer Applications, 2023, 43(6): 1870-1877. |
[7] | Xiuping ZHU, Yali LIU, Changlu LIN, Tao LI, Yongquan DONG. Efficient certificateless ring signature scheme based on elliptic curve [J]. Journal of Computer Applications, 2023, 43(11): 3368-3374. |
[8] | ZHAO Hong, YU Shuhan, HAN Yanyan, LI Zhaobin. Analysis and improvement of certificateless signature scheme [J]. Journal of Computer Applications, 2023, 43(1): 147-153. |
[9] | Suqing LIN, Shuhua ZHANG. Attribute-based encryption scheme with verifiable search and non-monotonic access structure [J]. Journal of Computer Applications, 2022, 42(9): 2772-2779. |
[10] | Jieqin WANG, Shihyang LIN, Shiming PENG, Shuo JIA, Miaohui YANG. Hierarchical resource allocation mechanism of cooperative mobile edge computing [J]. Journal of Computer Applications, 2022, 42(8): 2501-2510. |
[11] | Jingwen WU, Xinchun YIN, Jianting NING. Revocable aggregate signature authentication scheme for vehicular ad hoc networks [J]. Journal of Computer Applications, 2022, 42(3): 911-920. |
[12] | Qi LIU, Rongxin GUO, Wenxian JIANG, Dengji MA. Parallel chain consensus algorithm optimization scheme based on Boneh-Lynn-Shacham aggregate signature technology [J]. Journal of Computer Applications, 2022, 42(12): 3785-3791. |
[13] | Zhi LI, Jianbin XUE. Task offloading and resource allocation based on simulated annealing algorithm in C-V2X internet of vehicles [J]. Journal of Computer Applications, 2022, 42(10): 3140-3147. |
[14] | CHEN Weiwei, CAO Li, GU Xiang. E-forensics model for internet of vehicles based on blockchain [J]. Journal of Computer Applications, 2021, 41(7): 1989-1995. |
[15] | WANG Jiarui, TAN Guoping, ZHOU Siyuan. Clustered wireless federated learning algorithm in high-speed internet of vehicles scenes [J]. Journal of Computer Applications, 2021, 41(6): 1546-1550. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||