A Pairing-Free Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks

来源 :电子学报(英文版) | 被引量 : 0次 | 上传用户:wymanszeto
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Vehicular ad hoe networks (VANETs) cre-ate an vital platform for communication between vehicles,which can realize accident warning,auxiliary driving,road traffic information query,passenger communication and other applications.While providing convenient services for people,VANETs also bring some security risks.Security and privacy are the primary issues in the research of VANETs.Signcryption is an ideal way to transfer messages in a logical step in a secure and authenticated way.We design a Certificateless signcryption (CLSC) scheme to provide confidentiality,authentication,integrity,non-repudiation and user privacy preservation for the infor-mation transmitted between vehicle communication units.We demonstrate the confidentiality and unforgeability of the proposed scheme in the random oracle model.Moreover,compared with the existing CLSC schemes,ours realizes the perfect combination of efficiency,security and privacy,and it is particularly well adapted to the secure communication of vehicle networks.
其他文献
温度是影响超级电容器寿命的关键因素.为了掌握超级电容储能电源柜在正常工作载荷下的温度分布情况,暴露散热设计中的缺陷,针对性地提出优化设计方案,采用有限元仿真软件ANSYS/ICEPAK建立了超级电容储能电源柜的有限元三维模型,获得了超级电容储能电源柜在工作载荷下的温度随时间分布曲线,计算出了储能系统各区域温度到达稳定状态的时间,分析了超级电容储能电源柜的瞬态温度场分布特点.结合实际测量数据,验证了有限元仿真结果的有效性.根据仿真结果,提出了超级电容储能电源柜的优化设计方案.
Secret sharing is an important concept in cryptography,however it is a difficult problem to determine the access structure of the secret sharing scheme based on a linear code.In this work,we construct two-weight linear codes over finite field by using lin
Several Coronaviruses (CoVs) are epidem-ic pathogens that cause severe respiratory syndrome and are associated with significant morbidity and mortality.In this paper,a machine learning method was developed for predicting the risk of human infection posed
Aggregate signature schemes enable anyone to compress many signatures into one.Besides the unforgeability of aggregate signature,another property called aggregate extraction sometimes is useful.In sequential aggregate signature schemes,the aggregate signa
In recent years,adversarial examples has become one of the most important security threats in deep learning applications.For testing the security of deep learning models in adversarial environment,many researches focus on generating adversarial examples q
3D object detection based on point cloud has an important application prospect in automatic driving technology. Aiming at the low precision of 3D object detection based on point cloud and the poor rea
Electrocardiogram (ECG) is widely used in Myocardial infarction (MI) diagnosis.The automatic diagnosis of MI based on the 12-lead ECG needs to consider not only the waveform change features in multi-resolution time series,but also the spatial correlation
Trajectory prediction is a prerequisite for missile and high-speed vehicle guidance interception.To address the trajectory problem for the near space hyper-sonic unpowered gliding vehicle.Firstly,the trajectory prediction mechanism is analyzed.Based on th
With the expansion of data scale and the increase in data complexity,it is particularly important to accurately identify clusters and efficiently save clustering results.To address this,we propose a novel clustering algorithm,Shape clustering based on dat
Electromagnetic emissions from electrical information equipment may contain useful information and lead to information leakage. In order to detect the electromagnetic information leakage of digital vi