期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
A linkable signature scheme supporting batch verification for privacy protection in crowd-sensing 被引量:1
1
作者 Xu Li Gwanggil Jeon +1 位作者 Wenshuo Wang Jindong Zhao 《Digital Communications and Networks》 SCIE CSCD 2024年第3期645-654,共10页
The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more ... The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more privacy security challenges,the most commom which is privacy leakage.As a privacy protection technology combining data integrity check and identity anonymity,ring signature is widely used in the field of privacy protection.However,introducing signature technology leads to additional signature verification overhead.In the scenario of crowd-sensing,the existing signature schemes have low efficiency in multi-signature verification.Therefore,it is necessary to design an efficient multi-signature verification scheme while ensuring security.In this paper,a batch-verifiable signature scheme is proposed based on the crowd-sensing background,which supports the sensing platform to verify the uploaded multiple signature data efficiently,so as to overcoming the defects of the traditional signature scheme in multi-signature verification.In our proposal,a method for linking homologous data was presented,which was valuable for incentive mechanism and data analysis.Simulation results showed that the proposed scheme has good performance in terms of security and efficiency in crowd-sensing applications with a large number of users and data. 展开更多
关键词 5G network Crowd-sensing Privacy protection Ring signature batch verification
在线阅读 下载PDF
Review on Identity-Based Batch Verification Schemes for Security and Privacy in VANETs
2
作者 Eko Fajar Cahyadi Cahya Damarjati Min-Shiang Hwang 《Journal of Electronic Science and Technology》 CAS CSCD 2022年第1期92-110,共19页
The study of vehicular ad-hoc networks(VANETs)has received significant attention among academia;even so,its security and privacy still become a central issue that is wide-open to discuss.The authentication schemes dep... The study of vehicular ad-hoc networks(VANETs)has received significant attention among academia;even so,its security and privacy still become a central issue that is wide-open to discuss.The authentication schemes deployed in VANETs have a substantial impact on its security and privacy.Many researchers have proposed a variety of schemes related to the information verification and efficiency improvement in VANETs.In recent years,many papers have proposed identity-based batch verification(IBV)schemes in regard to diminishing overhead in the message verification process in VANETs.This survey begins with providing background information about VANETs and clarifying its security and privacy,as well as performance requirements that must be satisfied.After presenting an outlook of some relevant surveys of VANETs,a brief review of some IBV schemes published in recent years is conferred.The detailed approach of each scheme,with a comprehensive comparison between them,has been provided afterward.Finally,we summarize those recent studies and possible future improvements. 展开更多
关键词 Efficiency identity-based batch verification(IBV) security and privacy SURVEY vehicular ad-hoc networks(VANETs)
在线阅读 下载PDF
Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network 被引量:2
3
作者 Lemei Da Hai Liang +3 位作者 Yong Ding Yujue Wang Changsong Yang Huiyong Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期879-902,共24页
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such... The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information transmission.Due to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security threats.This paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.Each UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative domain.After successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage.There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,respectively.The security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution attack.It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)assumption.The performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity. 展开更多
关键词 Unmanned aerial vehicle cluster network certificateless signcryption certificateless signature batch verification source authentication data privacy blockchain
在线阅读 下载PDF
Practical Identity-Based Aggregate Signature from Bilinear Maps 被引量:1
4
作者 王竹 吴倩 +1 位作者 叶顶锋 陈辉焱 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期684-687,共4页
A new identity-based (ID-based) aggregate signature scheme which does not need any kind of interaction among the signers was proposed to provide partial aggregation. Compared with the existing ID-based aggregate sig... A new identity-based (ID-based) aggregate signature scheme which does not need any kind of interaction among the signers was proposed to provide partial aggregation. Compared with the existing ID-based aggregate signatures, the scheme is more efficient in terms of computational cost, Security in the random oracle model based on a variant of the computation Diflle-Hellman (CDH) problem is captured. 展开更多
关键词 identity-based signature bilinear map aggregate signature: batch verification
原文传递
Efficient Conditional Privacy-Preserving and Authentication Scheme for Secure Service Provision in VANET 被引量:8
5
作者 Hong Zhong Jingyu Wen +1 位作者 Jie Cui Shun Zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第6期620-629,共10页
Vehicle Ad hoc NETworks(VANET)can enhance traffic safety and improve traffic efficiency through cooperative communication among vehicles,roadside infrastructure,and traffic management centers.To guarantee secure servi... Vehicle Ad hoc NETworks(VANET)can enhance traffic safety and improve traffic efficiency through cooperative communication among vehicles,roadside infrastructure,and traffic management centers.To guarantee secure service provision in VANET,message authentication is important.Moreover,a vehicle user's private information can also be leaked during service provision.A protection mechanism is needed to prevent such leakage.Therefore,we propose a conditional privacy-preserving and authentication scheme for secure service provision in VANETs.The proposed scheme not only satisfies the security requirements of VANETs,but also optimizes the calculation process of signature generation and verification.We carry out a detailed comparative analysis.The result shows that the proposed scheme is more efficient than existing schemes in terms of communication overhead and computational cost.Therefore,our scheme is suitable for secure service provision in VANETs. 展开更多
关键词 VANET message authentication batch verification privacy-preserve elliptic curve
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部