This application claims priority to Chinese Patent Application No. 202210290875.4, filed on Mar. 23, 2022, the contents of which are hereby incorporated by reference.
The application relates to the technical field of cyberspace security, and in particular to a method for constructing an emergency reporting system of vehicle networking based on multi-signatures.
VANET is a dynamic network based on the availability of vehicles and infrastructure along the road. Through wireless communication of VANET, vehicles may share different kinds of information. When a vehicle witnesses an emergency (such as a traffic accident), the vehicle may send the message and its own signature to the roadside unit through VANET network. After receiving the message and verifying the validity of the signature, the roadside unit broadcasts the message to the vehicles within its communication range, thus achieving the purpose of avoiding secondary accidents. However, the dynamic characteristics of VANET also bring many problems that traditional networks do not have, such as the broadcast storm caused by too many vehicles sending the same emergency message to the roadside unit and the waste of computing resources caused by the slow signature generation of vehicles.
Multi-signatures technology is a popular technology nowadays, which allows a group of signers to generate a common signature on the same message. This signature may be verified by the public key of this group of signers, which means that all the signers in this group approve the message. The length of multi-signatures has nothing to do with the number of signatures, and is always consistent with the length of a single signature, which greatly reduces the information transmission and communication pressure. Since the concept of multi-signatures was put forward, the design of multi-signatures schemes has been fully studied, and the security of these schemes may be restricted to large integer decomposition problem, discrete logarithm problem and lattice difficulty problem.
In order to solve the problems of broadcast storm caused by traditional methods in the prior art and the waste of computing resources caused by slow signature generation at the vehicle end, the present application provides a method for constructing an emergency reporting system of vehicle networking based on multi-signatures. By combining multi-signatures algorithm with sub-exponent algorithm, the communication pressure and computing pressure of roadside units are reduced, and the common rogue key attack in multi-signatures is avoided.
In order to achieve the above technical purpose, the present application provides a method for constructing an emergency reporting system of vehicle networking based on multi-signatures, which includes:
Optionally, the obtaining process of the public-private key pair includes:
Optionally, the obtaining process of the pre-calculation parameters includes:
Optionally, the emergency authentication process includes:
Optionally, the obtaining process of the multi-signatures includes:
Optionally, the formula of the signature is as follows: ri′=(mi−m′)*ski*ci+ri,
Optionally, the formula of the aggregation operation is as follows: R=Σi=1n ri′,
Y=Π
i=1
n
y
i (i=1, . . . ,n),
where, R are multi-signatures, n is the number of vehicles willing to participate in emergency authentication, ri′ is the signature of the vehicle numbered i, Y is the aggregation parameter, and yi is the parameter randomly selected by the vehicle numbered i.
Optionally, the calculation formula of the pre-calculation parameters is as follows: Si=gr
where, Si and Mi are pre-calculation parameter, g is a generator of G, and is a public security parameter shared by the whole system, G is a cyclic group of order l, where l is a prime number, M is an emergency, and pki is the public key of the vehicle numbered i.
Optionally, the calculation formula of the hash value is m′=h(M),
where, m′ is the hash value, his any commonly used hash function and M is an emergency.
The application has the following technical effects.
By combining multi-signatures algorithm with sub-exponent algorithm, the problem of computing resource waste caused by broadcast storm and slow signature generation at vehicle end in traditional methods is improved, the communication pressure and computing pressure of roadside units are reduced, and the common rogue key attack in multi-signatures is avoided.
In order to more clearly explain the embodiments of the present application or the technical solutions in the prior art, the following will briefly introduce the drawing that need to be used in the embodiments. Obviously, the drawing in the following description are only some embodiments of the present application. For those of ordinary skill in the art, other drawing may be obtained according to these drawing without any creative labor.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawing in the embodiments of the present application. Obviously, the described embodiments are only part of the embodiments of the present application, but not all of them. Based on the embodiment of the present application, all other embodiments obtained by ordinary technicians in the field without creative labor are within the scope of the present application.
As shown in
S1, initializing the emergency reporting system to obtain the public-private key pairs and pre-calculation parameters of the vehicle set, and the process is as follows:
S2, obtaining the authentication information of the emergency based on the public-private key pair and the pre-calculation parameters, and the process is as follows:
S3, integrating the authentication information to obtain multi-signatures of emergencys, and the process is as follows:
The signature ri′ of each vehicle participating in the emergency authentication, the secret parameter yi calculated before, the small exponent ci and the public key pki of each vehicle willing to participate in the emergency authentication are sent to the vehicle N for aggregation. After the vehicle N collects all the signatures of the vehicle willing to participate in the emergency authentication, the vehicle N performs aggregation operation, and the aggregation operation formula is as follows:
While waiting for the multi-signatures and aggregation parameters sent by the vehicle, the roadside unit calculates the sub-exponent by using the sub-exponent algorithm, and then calculates the aggregation public key: PK=Πi=1n pkic
S4, regulating the traffic state based on multi-signatures to complete the system construction;
The above shows and describes the basic principle, main features and advantages of the present application. It should be understood by those skilled in the art that the application is not limited by the above-mentioned embodiments. The above-mentioned embodiments and descriptions only illustrate the principles of the application. Without departing from the spirit and scope of the application, there will be various changes and improvements of the application, all of which fall within the scope of the claimed application. The scope of that application is define by the appended claim and their equivalents.
Number | Date | Country | Kind |
---|---|---|---|
202210290875.4 | Mar 2022 | CN | national |