Stronger anonymity password authentication key exchange protocols based on traditional cryptography are not resistant to quantum computing attacks, and there is no lattice-only anonymous password authentication key exchange protocol protocol that satisfies the strong anonymity requirement. Therefore, this paper constructs stronger anonymity PAKE protocol based on the ring learning with errors (RLWE) and smooth projective hash function (SPHF) based on ideal lattice. The proposed protocol can achieve stronger anonymity and resists to desynchronization attacks and quantum attack. The security of the protocol is proved under the BPR model. The security and performance analysis shows that the proposed PAKE protocol has better advantages in security and efficiency.
With the development of the 5th Generation Mobile Communication Technology (5G), the 5G network can more accurately locate the user's location. This enables location-based services to provide users with more personalized services, but it also brings more challenges to user location privacy protection. Aiming at the leakage of location privacy and query privacy in LBS, a LBS privacy protection scheme based on searchable encryption is proposed. The scheme uses thresholds to replace the private information queried by users, thereby reducing the risk of location information leakage during user service requests; it reduces the storage space of the server through attribute-based encryption and improves query efficiency. Finally, the correctness of the ciphertext search of the scheme is proved.
In view of the fact that the current identity authentication protocol of the Internet of Vehicles has insufficient authentication strength and low security and leads to the leakage of user identity privacy. In this regard, this thesis mainly proposes a two-way authentication key exchange protocol based on smart cards, which uses the semigroup property of extended Chebyshev polynomials for session key negotiation, which not only realizes the two-way authentication of vehicles, roadside units and trusted institutions, but also the key agreement between the vehicle and the trusted authority is also completed. Using the BPR security model to prove the security, the results show that the protocol can meet the strong authentication requirements of 5G Internet of Vehicles and can effectively resist various security attacks, while protecting the user's identity privacy.
The virtual network function carried by the container has the advantages of strong orchestration ability and high flexibility. However, due to the poor natural isolation of the container, the security of the containerized virtual network function has attracted much attention. After trusted measurement of containerized virtual network functions based on trusted computing, how to reduce the privacy exposure of containerized virtual network functions under the premise of effective response to challengers has become an urgent problem to be solved. This paper proposes a trusted remote attestation protocol based on attribute certificates and ciphertext policy attribute-based encryption for containerized virtual network function, and uses Ban logic to perform inference analysis on this protocol. The results prove that the proposed is correct and can meet the expected goals.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.