An Improved Anonymous Authentication Method Based on Conditional Privacy Protection

An anonymous authentication and privacy protection technology, applied to services based on specific environments, vehicle parts, electrical components, etc., can solve the problems of long computing time for anonymous certificates and signature authentication

Active Publication Date: 2022-02-15
GUILIN UNIV OF ELECTRONIC TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution is mainly to solve the problem of long calculation time of anonymous certificate and signature authentication, as well as the problem of tracking malicious vehicles

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Improved Anonymous Authentication Method Based on Conditional Privacy Protection
  • An Improved Anonymous Authentication Method Based on Conditional Privacy Protection
  • An Improved Anonymous Authentication Method Based on Conditional Privacy Protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0054] This example is carried out under certain system assumptions, and the specific system model is as follows: figure 1 as shown,

[0055] Such as figure 2 As shown, an improved anonymous authentication method based on conditional privacy protection using the system model includes the following steps:

[0056] 1) System initialization, the process is as follows:

[0057] (1) Choose three cyclic groups G 1 ,G 2 ,G T , their orders are all large prime numbers q, from G 2 to G 1 , generating a homomorphic map ψ:G 2 →G 1 , and satisfy ψ(g 2 ) = g 1 , where g 1 and g 2 G respectively 1 and G 2 Generator, so get a bilinear map e:G 1 ×G 2 →G T ;

[0058] (2) According to the parameters in step (1) (G 1 ,G 2 ,G T ,e,q,g 1 , g 2 ), the trusted organization TA generates other system parameters, and TA selects two random numbers as the system's private key, and computes as the public key of the system;

[0059] (3) TA chooses a one-way hash function H: a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an improved anonymous authentication method based on conditional privacy protection, which is characterized in that it includes the following steps: 1) system initialization: 2) vehicle registration; 3) RSU registration; 4) short-term key generation; 5 ) Generation of anonymous certificate; 6) Message signature; 7) Authentication of anonymous certificate and message; 8) Condition tracking. This method realizes mutual authentication between OBU and RSU, and the identity information in the vehicle's anonymous certificate changes, the attacker cannot monitor and track the identity information of the vehicle, and can quickly find out the true identity of the malicious vehicle Information, as well as the invalidity of illegal vehicles, have identity authentication, anonymity, unlinkability, privacy protection and traceability, and improve authentication efficiency.

Description

technical field [0001] The invention relates to technical fields such as intelligent transportation, information security, and Internet of Vehicles authentication, and specifically relates to an improved anonymous authentication method based on conditional privacy protection. Background technique [0002] With the rapid development of technologies such as big data, mobile networks, and information processing, IoT technology has gradually been applied to various fields, including intelligent transportation systems such as the Internet of Vehicles. Intelligent transportation systems have received extensive attention at home and abroad. Vehicle networking, also known as vehicle ad hoc network (VANET), is developed from the traditional mobile network MANET. As an important part of the intelligent transportation system, it is the key to alleviating and solving existing traffic problems. VANET is a fast-moving wireless communication network that completes information exchange betw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/40H04L9/08H04W4/40H04W12/02H04W12/06H04W12/069H04W84/18H04W12/041
CPCH04W4/40H04W12/02H04W12/06H04W84/18H04L63/0428H04L63/08H04L63/0823H04L63/0869H04L9/0869H04L9/3263H04L63/0876H04L9/0897
Inventor 古天龙苑斌常亮刘忆宁王朋李龙吕松展
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products