跳到主要內容

臺灣博碩士論文加值系統

(34.204.172.188) 您好!臺灣時間:2023/09/27 17:15
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:梁力中
研究生(外文):LEUNG, LI-CHUNG
論文名稱:基於WOTS之車載網路條件隱私驗證協定
論文名稱(外文):WOTS-based Conditional Privacy-preserving Authentication Protocol for VANETs
指導教授:蔡國裕蔡國裕引用關係
指導教授(外文):TSAI, KUO-YU
口試委員:郭崇韋李靜怡蔡國裕
口試委員(外文):KUO, CHUNG-WEILEE, CHIN-ITSAI, KUO-YU
口試日期:2023-06-30
學位類別:碩士
校院名稱:逢甲大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2023
畢業學年度:111
語文別:英文
論文頁數:31
中文關鍵詞:Winternitz型一次性簽章車載網路條件隱私保護
外文關鍵詞:Winternitz-type one-time signaturevehicular ad-hoc networksconditional privacy-preserving
相關次數:
  • 被引用被引用:0
  • 點閱點閱:50
  • 評分評分:
  • 下載下載:1
  • 收藏至我的研究室書目清單書目收藏:0
基於一次性簽章( Winternitz-type one-time signature,簡稱WOTS),我們提出適用於車載網路 (vehicular ad hoc network,簡稱VANET)之條件隱私保護的驗證 (conditional privacy-preserving authentication,簡稱 CPPA) 協定。在我們所提出之CPPA中,可以同時確保隱私與相關安全性,且可以抵抗量子分析攻擊。根據安全分析與實驗結果,我們所提出之協定高效率地達到鑑別性、不可否認性、條件式隱私、不可連接性, 抗量子攻擊、抗假冒攻擊、抗修改攻擊、抗重送攻擊、抗中間人攻擊及抗驗證表竊取攻擊等。
Based on Winternitz-type one-time signature (WOTS for short), we propose a conditional privacy-preserving authentication (CPPA for short) protocol for a vehicular ad hoc network (VANET for short). Our proposed CPPA can ensure privacy and related security simultaneously. Further, the proposed CPPA can withstand quantum attacks. According to security analysis and experimental results, the proposed CPPA can efficiently achieve the following goals, including authentication, non-repudiation, conditional privacy, un-linkability, resistance to quantum analysis, resistance to impersonation attack, resistance to modification attack, resistance to replay attack, resistance to man-in-the-middle attack, resistance to stolen verifier table attack, etc.
Acknowledgments i
摘要 ii
Abstract iii
Table of Contents iv
List of Tables vi
List of Algorithms vii
List of Figures viii
Chapter 1 Introduction 1
Chapter 2 Preliminaries 4
2.1 Winternitz-type One-time Signature (WOTS) 4
2.2 Network Structure 6
2.3 Security Requirements 8
Chapter 3 Protocol 9
3.1 System Initialization 11
3.2 Pseudo-identity Generation and Message Signing 12
3.3 Message Verification 15
Chapter 4 Security Analysis and Comparisons 18
4.1 Authentication 18
4.2 Non-repudiation 18
4.3 Conditional Privacy 19
4.4 Un-linkability 19
4.5 Quantum Cryptanalysis 19
4.6 Resistant to Attacks 20
4.7 Security Comparisons 21
Chapter 5 Performance Analysis 22
5.1 Computation Cost Analysis 22
5.2 Communication Cost Analysis 27
Chapter 6 Conclusions 29
References 30

[1] J. B. Kenney, “Dedicated Short-Range Communications (DSRC) Standards in the United States,” Proceedings of the IEEE, Vol. 99, No. 7, pp. 1162-1182, Jul. 2011.
[2] D. He, S. Zeadally, B. Xu, and X. Huang, “An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks,” IEEE Transactions on Information Forensics and Security, Vol. 10, No. 12, pp. 2681-2691, Dec. 2015.
[3] Q. Li, D. He, Z. Yang, Q. Xie, and K.-K. R. Choo, “Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network,” IEEE Transactions on Vehicular Technology, Vol. 71, No. 4, pp. 4336-4347, Apr. 2022.
[4] M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput. Security, Vol. 15, No. 1, pp. 39–68, Jan. 2007.
[5] J. Zhang, J. Cui, H. Zhong, Z. Chen and L. Liu, “PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks,” IEEE Transactions on Dependable and Secure Computing, Vol. 18, No. 2, pp. 722-735, Mar. 2021
[6] V. Mavroeidis, K. Vishi, M. D. Zych, and A. Jøsang, “The Impact of Quantum Computing on Present Cryptography,” arXiv, Mar. 2018.
[7] A. Hülsing, “WOTS+ -- Shorter Signatures for Hash-Based Signature Schemes,” Cryptology ePrint Archive, Paper 2017/965, Oct. 2017.
[8] M. J. Dworkin, “SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions,” National Institute of Standards and Technology, Jul. 2015.
[9] J. Kelsey, S. Change, and R. Perlner, “SHA-3 derived functions: cSHAKE, KMAC, TupleHash and ParallelHash,” National Institute of Standards and Technology, Dec. 2016.
[10] MIRACL Ltd., “The MIRACL Core Cryptographic Library,” Available Online: https://github.com/miracl/core, Jun. 2019.
[11] J. G. Underhill, “Quantum Secure Cryptographic library in C,” Available Online: https://github.com/Steppenwolfe65/QSC, Jan. 2018.
[12] Victor Shoup, “NTL: A Library for doing Number Theory,” Available Online: https://www.shoup.net/, Jun. 2021.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top