Computer Engineering & Science ›› 2024, Vol. 46 ›› Issue (02): 232-243.
• Computer Network and Znformation Security • Previous Articles Next Articles
LI Yu-xin,WANG Zheng,WANG Hui,SUN Jian-wei
Received:
2023-01-30
Revised:
2023-05-29
Accepted:
2024-02-25
Online:
2024-01-25
Published:
2024-02-24
LI Yu-xin, WANG Zheng, WANG Hui, SUN Jian-wei. A revocable traceable access control scheme in autonomous vehicle platoon[J]. Computer Engineering & Science, 2024, 46(02): 232-243.
[1] | Mumtaz S,Bo A,Al-Dulaimi A,et al.Guest editorial 5G and beyond mobile technologies and applications for industrial IoT (IIoT)[J].IEEE Transactions on Industrial Informatics,2018,14(6): 2588-2591. |
[2] | Omar M S,Hassan S A,Pervaiz H,et al.Multiobjective optimization in 5G hybrid networks[J].IEEE Internet of Things Journal,2018,5(3): 1588-1597. |
[3] | Camerer C F,Li X M.Neural autopilot and context-sensitivity of habits[J].Current Opinion in Behavioral Sciences,2021,41: 185-190. |
[4] | Mao W L,Zhao Z W,Chang Z,et al.Energy-efficient industrial Internet of Things: Overview and open issues[J].IEEE Transactions on Industrial Informatics,2021,17(11): 7225-7237. |
[5] | Bergenhem C, Shladover S,Coelingh E,et al.Overview of platooning systems[C]∥Proc of the 19th ITS World Congress,2012:1-8. |
[6] | Chen C,Xiao T T,Qiu T,et al.Smart-contract-based economical platooning in blockchain-enabled urban Internet of Vehicles[J].IEEE Transactions on Industrial Informatics,2019,16(6): 4122-4133. |
[7] | Zhang C, Zhu L H, Xu C, et al.TPPR: A trust-based and privacy-preserving platoon recommendation scheme in VANET[J].IEEE Transactions on Services Computing,2019,15(2): 806-818. |
[8] | Ma H,Zhang R,Sun S Z,et al.Server-aided fine-grained access control mechanism with robust revocation in cloud computing[J].IEEE Transactions on Services Computing,2019,15(1): 164-173. |
[9] | 陈山枝.蜂窝车联网(C-V2X)及其赋能智能网联汽车发展的辩思与建议[J].电信科学,2022,38(7):1-17. |
Chen Shan-zhi.Discussion and suggestion on the development of cellular vehicle networking (C-V2X) and its enabling intelligent connected vehicles [J].Telecommunications Science,2022,38(7): 1-17. | |
[10] | Alam A A,Gattami A,Johansson K H.An experimental study on the fuel reduction potential of heavy duty vehicle platooning[C]∥Proc of the 13th International IEEE Confe- rence on Intelligent Transportation Systems,2010: 306-311. |
[11] | Cao K Y,Liu Y F,Meng G J,et al.An overview on edge computing research[J].IEEE Access,2020,8: 85714-85728. |
[12] | Sahai A,Waters B.Fuzzy identity-based encryption[C]∥Proc of International Conference on Theory and Applications of Cryptographic Techniques,2005:457-473. |
[13] | Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥Proc of the 13th ACM Conference on Computer and Communications Security,2006: 89-98. |
[14] | Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]∥Proc of 2007 IEEE Symposium on Security and Privacy,2007: 321-334. |
[15] | Tu S S,Niu S Z,Li H.A fine-grained access control and re- vocation scheme on clouds[J].Concurrency and Computation: Practice and Experience,2016,28(6): 1697-1714. |
[16] | Guo R,Yang G,Shi H X,et al.O3-R-CP-ABE: An efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system[J].IEEE Internet of Things Journal,2021,8(11): 8949-8963. |
[17] | Zhao Y A,Wang Y P,Cheng X C,et al.RFAP: A revocable fine-grained access control mechanism for autonomous vehicle platoon[J].IEEE Transactions on Intelligent Transportation Systems,2021,23(7): 9668-9679. |
[18] | Zhao Y,Ren M,Jiang S Q,et al.An efficient and revocable storage CP-ABE scheme in the cloud computing[J].Computing,2019,101(8): 1041-1065. |
[19] | 王皓,郑志华,吴磊,等.自适应安全的外包CP-ABE方案研究[J].计算机研究与发展,2015,52(10): 2270-2280. |
Wang Hao,Zheng Zhi-hua,Wu Lei,et al.Adaptively secure outsourcing ciphertext-policy attribute-based encryption[J].Journal of Computer Research and Development,2015,52(10): 2270-2280. | |
[20] | Sethi K, Pradhan A, Bera P. Practical traceable multi- authority CP-ABE with outsourcing decryption and access policy updation[J].Journal of Information Security and Applications,2020,51: 102435-102461. |
[21] | Raya M,Hubaux J P.The security of vehicular ad hoc networks[C]∥Proc of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks,2005: 11-21. |
[22] | Bayat M,Barmshoory M,Rahimi M,et al.A secure authentication scheme for VANETs with batch verification[J].Wireless Networks,2015,21(5): 1733-1743. |
[23] | Jiang S R,Zhu X Y,Wang L M.An efficient anonymous batch authentication scheme based on HMAC for VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2016,17(8): 2193-2204. |
[24] | Malhi A,Batra S.Privacy-preserving authentication framework using bloom filter for secure vehicular communications[J].International Journal of Information Security,2016,15(4): 433-453. |
[25] | Guo Z Z,Wang G L,Li Y X,et al.Accountable attribute-based data sharing scheme based on blockchain for vehicular ad hoc network[J].IEEE Internet of Things Journal,2023,10(8):7011-7026. |
[26] | Barbosa M, Farshim P.Secure cryptographic workflow in the standard model[C]∥Proc of International Conference on Cryptology in India,2006: 379-393. |
[27] | Zhou J,Ou Y H.Key tree and Chinese remainder theorem based group key distribution scheme[C]∥Proc of the 9th International Conference on Algorithms and Architectures for Pa- rallel Processing,2009: 254-265. |
[28] | Vijayakumar P,Bose S,Kannan A.Chinese remainder theorem based centralised group key management for secure multicast communication[J].IET Information Security,2014,8(3): 179-187. |
[29] | Miller V S.Use of elliptic curves in cryptography[C]∥Proc of Conference on the Theory and Application of Cryptographic Techniques,1985: 417-426. |
[30] | Waters B.Ciphertext-policy attribute-based encryption: An expressive,efficient,and provably secure realization[C]∥Proc of International Workshop on Public Key Cryptography,2011: 53-70. |
[31] | 张静.面向车联网的匿名认证及密钥协商机制研究[D].合肥:安徽大学,2021. |
Zhang Jing.Research on anonymous authentication and key negotiation mechanism for Internet of Vehicles [D].Hefei:Anhui University,2021. | |
[32] | Pointcheval D,Stern J.Security arguments for digital signatures and blind signatures[J].Journal of Cryptology,2000,13(3): 361-396. |
[1] | DING Yan, WANG Peng, WANG Chuang, LI Zhi-peng, SONG Lian-tao, FENG Liao-liao. An attribute-based dynamic mandatory access control mechanism for operating system [J]. Computer Engineering & Science, 2023, 45(10): 1770-1778. |
[2] | XU Cheng-zhou, LI Lu, ZHANG Wen-tao. An attribute-based encryption scheme supporting complex access policies [J]. Computer Engineering & Science, 2023, 45(10): 1779-1788. |
[3] | DUAN Ya-hong, WANG Zheng, ZHAO Juan-juan, WANG Long. A verifiable attribute encryption scheme supporting decryption outsourcing in fog computing [J]. Computer Engineering & Science, 2023, 45(03): 443-452. |
[4] | XU Cheng-zhou, WANG Chen, ZHANG Wen-tao. A time factor based revocable and traceable attribute-based encryption scheme [J]. Computer Engineering & Science, 2023, 45(02): 286-294. |
[5] | NIU Shu-fen, ZHANG Mei-ling, ZHOU Si-wei, YAN Sen. A ciphertext verifiable attribute-based searchable encryption scheme for mobile terminals [J]. Computer Engineering & Science, 2022, 44(11): 1941-1950. |
[6] | TANG Guang-zhen, CHEN Zhuo. A traceable hierarchical attribute-based encryption scheme with hidden access policy [J]. Computer Engineering & Science, 2022, 44(10): 1788-1794. |
[7] | NIU Shu-fen, YU Fei, CHEN Li-xia, WANG Cai-fen. A data sharing scheme for encrypted electronic health record [J]. Computer Engineering & Science, 2022, 44(09): 1610-1619. |
[8] | CUI Chen-yu, ZHANG Li-na, . A threshold multi-secret sharing scheme with identity lock [J]. Computer Engineering & Science, 2022, 44(08): 1382-1391. |
[9] | XU Cheng-zhou, ZHANG Wen-tao, LANG Jing-hong. An attribute-based encryption scheme preventing irrelevant attributes interference [J]. Computer Engineering & Science, 2022, 44(05): 800-809. |
[10] | WANG Xin, LIU Xiao-yan, ZHANG Kai-qi, WANG Xing, YAN Xin. Design and implementation of a change event driven microservice composition platform [J]. Computer Engineering & Science, 2021, 43(10): 1781-1788. |
[11] | CHEN Si-qi, HUANG Ru-wei. Attribute-based encryption supporting conjunctive keyword [J]. Computer Engineering & Science, 2021, 43(07): 1219-1225. |
[12] |
ZE Kai1,CHEN Dan1,2,ZHUANG Yi1.
A multilevel dynamic trusted measurement
model based on information flow
[J]. Computer Engineering & Science, 2018, 40(12): 2156-2163.
|
[13] |
YANG Xiaodong,YANG Miaomiao,LIU Tingting,WANG Caifen.
A multi-domain access control scheme based on
multi-authority attribute encryption for cloud storage
|
[14] |
WEI Lifeng,DING Yan,CHEN Songzheng,HUANG Chenlin.
A method for protecting user data files based on private directory container [J]. J4, 2016, 38(03): 460-464. |
[15] |
ZHAO Bin1,2,HE Jingsha1, ZHANG Yixuan1,JI Xinrong1.
A risk minimization authorization model based on knowledge discovery [J]. J4, 2015, 37(11): 2112-2120. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
湘公网安备 43010502000083号
湘ICP备10006030号
Copyright © Computer Engineering & Science, All Rights Reserved.
Address:109 Deya Rd,Changsha,hunan(410073) Tel: 0731-87002567 Email: jsjgcykx@vip.163.com
Powered by Beijing Magtech Co., Ltd.