期刊文献+

一种可信的车联网区块链数据共享模型 被引量:8

Trusted Data Sharing Model for Internet of Vehicles Blockchain
下载PDF
导出
摘要 车联网大数据时代的兴起,信任问题已经成为大数据面临的最大问题,它对数据安全流通和车联网产业发展造成影响.以区块链作为数据共享的平台是当下研究的热点,在车联网中发挥着重要作用.结合区块链及雾计算服务器更好地实现车辆私有数据的存储和共享问题,同时为保证数据的可靠性及减少车辆与被授权的第三方组织和个人共享数据时的频繁交互,结合无证书代理签密技术,本文提出一个基于区块链的车联网数据共享模型.通过分析发现,该模型不仅在通信开销与算力方面耗能较少,而且在安全性上有良好的表现,具有可靠的实现性. With the rise of the Internet of Vehicles big data era,the issue of trust has become the biggest problem facing big data,which has an impact on the safe circulation of data and the development of the Internet of Vehicles industry.Using blockchain and vehicular fog node servers to better realize the storage and sharing of vehicle private data.At the same time,to ensure the reliability of data and reduce the frequent interactions between vehicles and authorized third-party organizations and individuals when sharing data,combined with no certificateless proxy signcryption,this article proposes a data sharing model for the Internet of Vehicles based on blockchain.Through the analysis,it is found that the model not only consumes less energy in terms of communication overhead and computing power,but also has good performance in security and reliable implementation.
作者 陶永才 李哲 石磊 卫琳 杨淑博 TAO Yong-cai;LI Zhe;SHI Lei;WEI Lin;YANG Shu-bo(School of Information Engineering,Zhengzhou University,Zhengzhou 450001,China;School of Software,Zhengzhou University,Zhengzhou 450002,China)
出处 《小型微型计算机系统》 CSCD 北大核心 2021年第10期2131-2139,共9页 Journal of Chinese Computer Systems
基金 国家重点研发计划项目(2018YFB1701400)资助。
关键词 车联网 多接收者签密 无证书密码体制 代理签密 Internet of vehicles multi-receiver signcryption the idea of a certificateless signcryption proxy signcryption
  • 相关文献

参考文献12

二级参考文献70

  • 1李梅,李大兴.基于Tate对的指定多接收者签密方案[J].山东大学学报(工学版),2006,36(3):43-45. 被引量:5
  • 2LI Fagen,HU Yupu,LIU Shuanggen.Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings[J].Wuhan University Journal of Natural Sciences,2007,12(1):17-20. 被引量:5
  • 3MAMBO M, USUDA K, OKAMOTO E. Proxy signatures:delegation of the power to sign messages[J]. IEICE Transactions on Fundamentals, 1996, E79-A(9): 1338-1354.
  • 4KIM S, PARK S, WON D. Proxy signatures, revisited[C] ffProe ICICS'97, International Conference on Information and Communications Security. LNCS 1334. Berlin: Springer-Verlag, 1997: 223-232.
  • 5ZHENG Y L. Digital signcryption or how to achieve cost(signature & encryption)<<cost(signature) + cost(encryption)[C]//Advances in Cryptology:CRYPTO 1997. LNCS 1294. Berlin:Springer-Verlag,1997: 165-179.
  • 6LEE J M. Identity-based signeryption[EB/OL]. [2002-07-19]. httpt//eprint. iaer. org/2002/098. ps. gz.
  • 7LIBERT B, QUISQUATER J. New identity based signeryption scheme from pairings[EB/OL]. [2003-02-24]. http://eprint. iaer. org/2003/023/023. ps. gz.
  • 8WANG M, LI H, LIU Z J. Efficient identity based proxy-signcryption schemes with forward security and public verifiability[C]//ICCNMC 2005. LNCS 3619. Berlin: Springer-Verlag,2005:982-991.
  • 9LI X X,CHEN K F. Identity based proxy-signcryption scheme from pairings[C] //IEEE International Conference on Services Computing. Los Alamitos, California: IEEE Computer Society Press, 2004 : 494-497.
  • 10BELLARE M, BOLDYREVA A, MICALI S. Public-key eneryption in a multi-user setting: Security proofs and improvements[C] // Advances in Cryptology: EUROCRYPT 2000. LNCS 1807. Berlin: Springer-Verlag, 2000: 259-274.

共引文献150

同被引文献93

引证文献8

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部