Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (5): 127-137.doi: 10.11959/j.issn.2096-109x.2023070
• Papers • Previous Articles
Zhiwang HE, Huaqun WANG
Revised:
2023-01-09
Online:
2023-10-01
Published:
2023-10-01
Supported by:
CLC Number:
Zhiwang HE, Huaqun WANG. Anonymous group key distribution scheme for the internet of vehicles[J]. Chinese Journal of Network and Information Security, 2023, 9(5): 127-137.
[1] | LI X C . Blockchain-based group key agreement protocol for vehicular ad hoc networks[J]. Computer Communications, 2022,183: 107-120. |
[2] | CHEN J N , HUANG Z J , ZHOU Y P ,et al. Efficient certificate-based aggregate signature scheme for vehicular ad hoc networks[J]. IET Networks, 2020,9(6): 290-297. |
[3] | REN Y L , LI X Y,SUNSF ,et al. Privacy-preserving batch verification signature scheme based on blockchain for vehicular ad-hoc networks[J]. Journal of Information Security and Applications, 2021,58:102698. |
[4] | YANG X D , LIU R , WANG M D ,et al. Identity-based aggregate signature scheme in vehicle ad-hoc network[C]// Proceedings of 2019 4th International Conference on Mechanical,Control and Computer Engineering (ICMCCE). 2020: 1046-10463. |
[5] | MOHANTY S , JENA D , PANIGRAHY S K . A secure RSU-aided aggregation and batch-verification scheme for vehicular networks[C]// International Conference on Soft Computing and Its Applications (ICSCA’2012). 2012: 174-178. |
[6] | BONEH D , GENTRY C , LYNN B ,et al. Aggregate and verifiably encrypted signatures from bilinear maps[M]// Lecture Notes in Computer Science. 2003: 416-432. |
[7] | LI J , KIM K , ZHANG F G ,et al. Aggregate proxy signature and verifiably encrypted proxy signature[C]// Proceedings of the 1st International Conference on Provable Security. 2007: 208-217. |
[8] | AHN J H , GREEN M , HOHENBERGER S . Synchronized aggregate signatures:new definitions,constructions and applications[C]// Proceedings of the 17th ACM Conference on Computer and Communications Security. 2010: 473-484. |
[9] | NEVEN G . Efficient sequential aggregate signed data[J]. IEEE Transactions on Information Theory, 2011,57(3): 1803-1815. |
[10] | CHEON J H . A new ID-based signature with batch verification[R]. Cryptology Eprint Archive Report, 2004. |
[11] | SHEN L M , MA J F , LIUXM ,et al. A secure and efficient ID-based aggregate signature scheme for wireless sensor networks[J]. IEEE Internet of Things Journal, 2017,4(2): 546-554. |
[12] | IWASAKI T , YANAI N , INAMURA M ,et al. Tightly-secure identity-based structured aggregate signature scheme under the computational Diffie-Hellman assumption[C]// Proceedings of 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA). 2016: 669-676. |
[13] | YANG X D , LIU R , WANG M D ,et al. Identity-based aggregate signature scheme in vehicle ad-hoc network[C]// Proceedings of 2019 4th International Conference on Mechanical,Control and Computer Engineering (ICMCCE). 2020: 1046-10463. |
[14] | CASTRO R , DAHAB R . Efficient certificate less signatures suitable for aggregation[J]. IACR Cryptol Eprint Arch,2007, 2007:454. |
[15] | XIONG H , GUAN Z , CHEN Z ,et al. An efficient certificateless aggregate signature with constant pairing computations[J]. Information Sciences, 2013,219: 225-235. |
[16] | HASHIMOTO K , OGATA W . Unrestricted and compact certificate less aggregate signature scheme[J]. Information Sciences, 2019,487: 97-114. |
[17] | GUO Y M , ZHANG Z F , GUO Y J . Anonymous authenticated key agreement and group proof protocol for wearable computing[J]. IEEE Transactions on Mobile Computing, 2022,21(8): 2718-2731. |
[18] | KUMAR V , KUMAR R , PANDEY S K . A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem[J]. Journal of King Saud University-Computer and Information Sciences, 2020,32(9): 1081-1094. |
[19] | SRINIVAS J , DAS A K , KUMAR N ,et al. Cloud centric authentication for wearable healthcare monitoring system[J]. IEEE Transactions on Dependable and Secure Computing, 2020,17(5): 942-956. |
[20] | FIAT A , NAOR M . Broadcast encryption[C]// Annual International Cryptology Conference. 1993: 480-491. |
[21] | ZHONG H , ZHANGS , CUIJ ,et al. Broadcast encryption scheme for V2I communication in VANETs[J]. IEEE Transactions on Vehicular Technology, 2022,71(3): 2749-2760. |
[22] | GAO R H , ZENG J W , DENG L Z . Efficient certificate less anonymous multi-receiver encryption scheme without bilinear parings[J]. Mathematical Problems in Engineering, 2018,2018: 1-13. |
[23] | 张泽林, 王化群 . 基于区块链的工业互联网动态密钥管理[J]. 计算机研究与发展, 2023,60(2): 386-397. |
ZHANG Z L , WANG H Q . Dynamic key management of industrial Internet based on blockchain[J]. Journal of Computer Research and Development, 2023,60(2): 386-397. | |
[24] | WANG H Q . Provably secure anonymous multi-receiver identity-based encryption with shorter ciphertext[C]// Proceedings of 2014 IEEE 12th International Conference on Dependable,Autonomic and Secure Computing. 2014: 85-90. |
[25] | BONEH D , FRANKLIN M . Identity-based encryption from the Weil pairing[M]// Advances in Cryptology — CRYPTO 2001. 2001: 213-229. |
[26] | MIYAJI A , NAKABAYASHI M , TAKANO S . Characterization of elliptic curve traces under FR-reduction[M]// Lecture Notes in Computer Science. 2001: 90-108. |
[1] | Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG. Lightweight terminal cross-domain authentication protocol in edge computing environment [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 74-89. |
[2] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[3] | Jin CAO, Xiaoping SHI, Ruhui MA, Hui LI. Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 18-31. |
[4] | Hui GUO, Yong LUO, Xiaolu GUO. Automotive ethernet controller authentication method based on national cryptographic algorithms [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 20-28. |
[5] | Jun LIU, Lin YUAN, Zhishang FENG. Survey of key management schemes for cluster networks [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69. |
[6] | Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG. Dynamic and efficient vehicular cloud management scheme with privacy protection [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83. |
[7] | Qi JIANG, Ru FENG, Ruijie ZHANG, Jinhua WANG, Ting CHEN, Fushan WEI. GRU-based multi-scenario gait authentication for smartphones [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 26-39. |
[8] | Cong YI, Jun HU. Novel continuous identity authentication method based on mouse behavior [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 179-188. |
[9] | Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN. Blockchain-based high transparent PKI authentication protocol [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11. |
[10] | Jie YI, Tengfei CAO, Shuai GAO, Jianqiang HUANG. Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 157-167. |
[11] | Jianlin NIU, Zhiyu REN, Xuehui DU. Cross-domain authentication scheme based on consortium blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 123-133. |
[12] | Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU. Hierarchical proxy consensus optimization for IoV based on blockchain and trust value [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 142-153. |
[13] | Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU. Fast handover authentication scheme in 5G mobile edge computing scenarios [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 154-168. |
[14] | Zijun XU, Jianwei LIU, Geng LI. Research on network slicing security for 5G mMTC [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 95-105. |
[15] | Guanqun YANG, Yin LIU, Hao XU, Hongwei XING, Jianhui ZHANG, Entang LI. Credible distributed identity authentication system of microgrid based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 88-98. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|