{"title":"一种新的车载网络认证协议","authors":"Xiong Peng","doi":"10.1109/ICSAI.2016.7811036","DOIUrl":null,"url":null,"abstract":"The identity of the vehicle is the only legal identification of the vehicle at the trusted center. It is directly related to the information of the vehicle user, and the anonymous authentication of the vehicle identity is an embodiment of the user privacy protection. Based on this, an on-board network anonymous authentication protocol is designed on the basis of certificateless signature scheme. The protocol does not require certificate management and there is no key escrow problem. The results show that the protocol authentication efficiency is significantly higher than that of the certificate-based authentication protocol and the identity-based authentication protocol, while satisfying the requirements of anonymity, non-repudiation, mutual authentication, conditional privacy protection and Anti-replay aggression.","PeriodicalId":90521,"journal":{"name":"IEEE International Conference on Systems Biology : [proceedings]. IEEE International Conference on Systems Biology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A novel authentication protocol for vehicle network\",\"authors\":\"Xiong Peng\",\"doi\":\"10.1109/ICSAI.2016.7811036\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The identity of the vehicle is the only legal identification of the vehicle at the trusted center. It is directly related to the information of the vehicle user, and the anonymous authentication of the vehicle identity is an embodiment of the user privacy protection. Based on this, an on-board network anonymous authentication protocol is designed on the basis of certificateless signature scheme. The protocol does not require certificate management and there is no key escrow problem. The results show that the protocol authentication efficiency is significantly higher than that of the certificate-based authentication protocol and the identity-based authentication protocol, while satisfying the requirements of anonymity, non-repudiation, mutual authentication, conditional privacy protection and Anti-replay aggression.\",\"PeriodicalId\":90521,\"journal\":{\"name\":\"IEEE International Conference on Systems Biology : [proceedings]. IEEE International Conference on Systems Biology\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE International Conference on Systems Biology : [proceedings]. IEEE International Conference on Systems Biology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSAI.2016.7811036\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE International Conference on Systems Biology : [proceedings]. IEEE International Conference on Systems Biology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSAI.2016.7811036","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel authentication protocol for vehicle network
The identity of the vehicle is the only legal identification of the vehicle at the trusted center. It is directly related to the information of the vehicle user, and the anonymous authentication of the vehicle identity is an embodiment of the user privacy protection. Based on this, an on-board network anonymous authentication protocol is designed on the basis of certificateless signature scheme. The protocol does not require certificate management and there is no key escrow problem. The results show that the protocol authentication efficiency is significantly higher than that of the certificate-based authentication protocol and the identity-based authentication protocol, while satisfying the requirements of anonymity, non-repudiation, mutual authentication, conditional privacy protection and Anti-replay aggression.