Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-quantum computing Internet of Vehicles system based on secret sharing and mobile terminal and authentication method thereof

A mobile terminal and secret sharing technology, applied in the field of secret sharing, can solve the problems of inability to resist quantum computing, unfavorable identification, and too simple.

Active Publication Date: 2020-05-29
南京如般量子科技有限公司 +1
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007]Although the current Internet of Vehicles system can realize communication between vehicles and between vehicles and roadside units, and has a certain degree of security, it cannot Anti-quantum computing, there are still some security problems, the existing security problems are as follows:
[0008] 1. If the OBU’s ID is disclosed, it may cause information leakage of the owner. If the ID is recorded in multiple locations, ID tracking can be realized. In some application scenarios, it is a serious information leakage;
[0009]2. Issue a symmetric key to the OBU, because the symmetric key cannot be used for reliable digital signatures, so it is not good for identification;
[0010]3. Issue an asymmetric key pair to the OBU and use the private key for digital signature. This method cannot resist quantum computing because the public key needs to be disclosed when verifying the digital signature;
[0011]4. Issue the private key of the asymmetric key to the OBU and store the public key in the server, which can resist quantum computing, but because the public key at the server is controlled by ID or ID-like public key pointer random number, so the ID or public key pointer random number must be disclosed, resulting in user information leakage;
[0012]5. OBU's driver authentication process is missing or too simple, so OBU's driver authentication process is not safe enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing Internet of Vehicles system based on secret sharing and mobile terminal and authentication method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The asymmetric algorithm used in this embodiment is identity-based cryptography. The key management server issues private keys to clients respectively. The identity of the client is ID, the public key is PK, and the private key is SK.

[0076] Based on relevant knowledge of identity cryptography: Suppose G is a group, take generator P from G, and select a random number as the private key s of the key management server, and have the public key Ppub=sP of the key management server. The key management server of this patent includes the identity used by the mobile terminal key system, issuing public and private keys, and the public and private keys of the identity are IDSM, PpubM / sM, PKSM / SKSM respectively, and the identity used by the OBU key system, issuing public and private keys, and identity The public and private keys are IDSC, PpubC / sC, and PKSC / SKSC respectively, where PKSM=H(IDSM), SKSM=sM*PKSM, PKSC=H(IDSC), SKSC=sC*PKSC. Since there is no need for communication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-quantum computing Internet of Vehicles system based on secret sharing and a mobile terminal and an authentication method thereof. The system comprises a plurality of mobile terminals, a third-party trust mechanism, vehicle keys, vehicle-mounted units and roadside units. The vehicle keys and the vehicle-mounted units are arranged on a plurality of vehicles. The roadside units are used for transmitting messages of the vehicle-mounted units and the third-party trust mechanism. The mobile terminals and the vehicle-mounted units are paired in a one-to-one mode, and the vehicle-mounted units authenticate the mobile terminals. By arranging the mobile terminal, the safety of the vehicle-mounted unit to the driver authentication process is enhanced in the authentication of the vehicle-mounted unit to the mobile terminal. A signature based on ID cryptography is adopted for a transmitted message, an ID is changed into a form of a public key random number, secret sharing is adopted, and a secret is added into the signature message, so that an actual signature message cannot be obtained by an enemy, and a digital signature has very high quantum-resistant computing security. The offset is used, so that the transmission process is safer, and meanwhile, the equipment burden is reduced.

Description

technical field [0001] The invention relates to the field of secret sharing, in particular to a quantum computing-resistant Internet of Vehicles system based on secret sharing and a mobile terminal and an authentication method thereof. Background technique [0002] Vehicle-to-vehicle ad hoc network (VANET, vehicular ad hocnetwork) is a wireless local area network technology that uses vehicles and roadside units as network nodes to provide communication services between vehicles and vehicles (V2V) and between vehicles and roadside units (V2R). while creating a mobile network. VANET is an application of wireless Mesh network. Wireless Mesh network combines the advantages of wireless local area network and self-organizing network (ad hoc). It is a large-capacity, high-speed, and wide-coverage network; The topological structure can provide reliable transmission, has the characteristics of good scalability and low initial investment, and is an ideal solution for wireless broadba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/44H04W4/48H04W4/80H04W12/00H04W12/04H04W12/06H04W12/03H04W12/0433
CPCH04W4/44H04W4/48H04W4/80H04W12/06H04W12/03H04W12/0433
Inventor 富尧钟一民茆冬梅
Owner 南京如般量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products