Computer Science ›› 2022, Vol. 49 ›› Issue (11A): 210900218-6.doi: 10.11896/jsjkx.210900218
• Information Security • Previous Articles Next Articles
CHEN Bin1, XU Huan1, XI Jian-fei2, LEI Mei-lian2, ZHANG Rui3, QIN Shi-han3
CLC Number:
[1]FU Z X,LI X Y,YUAN Y.Research on Key Technologies of Ubiquitous Power Internet of Things [J].Electric Power Construction,2019,40(5):1-12. [2]REN T Y,WANG X H,GUO G X,et al.Design of power Internet of Things data security system based on multiple authentication and lightweight password[J].Journal of Nanjing University of Posts and Telecommunications,2020,40(6):12-19. [3]ZHANG L,ZHAO L,YIN S,et al.A lightweight authentication scheme with privacy protection for smart grid communications[J].Future Generation Computer Systems,2019,100(Nov.):770-778. [4]ZUO J Y.A privacy-preserving data aggregation algorithm inSmart Grid networks[J].Journal of Terahertz Science and Electronic Information Technology,2021,19(3):485-489. [5]HOUSLEY R,POLK W,FORD W,et al.RFC,3280.InternetX.509 Public Key Infrastructure Certificate and Certificate Revocation List(CRL) Profile[J].Rfc,2002. [6]SHAMIR A.Identity Based Cryptosystems and SignatureScheme[M].Blakley G R,Chaum D,eds.,1984. [7]TAN C,CHEN M J,AMUAH E A.Research on distributedidentity authentication mechanism of IoT device based on blockchain[J].Chinese Journal on Internet of Things,2020,4(2):70-77. [8]LI H,LU R,LIANG Z,et al.An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid[J].IEEE Systems Journal,2014,8(2):655-663. [9]CHIM T,YIU S,HUI L,et al.PASS:Privacy-preserving au-thentication scheme for smart grid network[C]//Proceedings of the 2011 IEEE International Conference on Smart Grid Communications.IEEE,2011. [10]FOUDA M M,FADLULLAH Z M,et al.A Lightweight Message Authentication Scheme for Smart Grid Communications[J].IEEE Transactions on Smart Grid,2011,2(4):675-685. [11]KHALI D,MAHMOO D,SHEHZA D,et al.An elliptic curve cryptography based lightweight authentication scheme for smart grid communication[J].Future Generations Computer Systems:FGCS,2018,81:557-565. [12]LIAO H M,YU G,BAN G M,et al.Research on Identity Authentication Technology in Power Internet of Things Based on SM9 Algorithm[J].Shandong Electric Power,2020,47(10):1-5. [13]SHEN H P,CHEN Y C.Study of Authentication Mechanism in Federated Internet of Things[J].Computer Engineering,2016,42(9):110-115. [14]YAN H Q,WANG L J.Research of authentication techniques for the Internet of things[J].Journal on Communications,2020,41(7):213-222. [15]MAHMOUD M M E A,MIŠIĆ J, AKKAYA K, et al. Investigating public-key certificate revocation in smart grid[J]. IEEE Internet of Things Journal, 2015, 2(6): 490-503. [16]MC A,KA B.Communication-efficient certificate revocationmanagement for Advanced Metering Infrastructure and IoT Integration[J].Future Generation Computer Systems,2021,115:267-278. [17]BLOOLM B H.Space/time trade-offs in hash coding with allowable errors[J].Communications of the ACM,1970,13(7):422-426. [18]BENALOH J,MARE M D.One-Way Accumulators:A Decentralized Alternative to Digital Signatures[C]//Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology.1995. [19]CAMENISCH J,LYSYANSKAYA A.Dynamic Accumulatorsand Application to Efficient Revocation of Anonymous Credentials[C]//22nd Annual International Cryptology Conference(CRYPTO 2002).Santa Barbara,California,USA,2002:18-22. [20]BARIC N,PFITZMANN B.Collision-free accumulators and fail-stop signature schemes without trees[C]//The 16th Annual International Conference on Theory and Application of Cryptographic Techniques.Konstanz,Germany,1997:480-494. [21]TRIANDOPOULOS N,PAPAMANTHOU C,TAMASSIA R.Authenticated hash tables[C]//Proceedings of the 15th ACM Conference on Computer and communications security.ACM Conference on Computer & Communications Security.DBLP,2008. |
[1] | FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327. |
[2] | WANG Xiang-yu, YANG Ting. Routing Directory Server Defined by Smart Contract [J]. Computer Science, 2021, 48(6A): 504-508. |
[3] | WANG Xi-long, LI Xin, QIN Xiao-lin. Collaborative Scheduling of Source-Grid-Load-Storage with Distributed State Awareness UnderPower Internet of Things [J]. Computer Science, 2021, 48(2): 23-32. |
[4] | ZHANG Wang-ce, FAN Jing, WANG Bo-ru and NI Min. (α,k)-anonymized Model for Missing Data [J]. Computer Science, 2020, 47(6A): 395-399. |
[5] | LUO Peng-yu, WU Le, LYU Yang, YUAN Kun-ping, HONG Ri-chang. Temporal Reasoning Based Hierarchical Session Perception Recommendation Model [J]. Computer Science, 2020, 47(11): 73-79. |
[6] | WANG Qing-long, QIAO Rui, DUAN Zong-tao. Security Analysis on VANETs Authentication Schemes:CPAV and ABV [J]. Computer Science, 2019, 46(4): 177-182. |
[7] | CHEN Hong-yun, WANG Jie-hua, HU Zhao-peng, JIA Lu, YU Ji-wen. Privacy Preserving Algorithm Based on Dynamic Update in Medical Data Publishing [J]. Computer Science, 2019, 46(1): 206-211. |
[8] | YUE Xiao-han, HUI Ming-heng, WANG Xi-bo. Forward Security Anonymous Authentication Protocol Based on Group Signature for Vehicular Ad Hoc Network [J]. Computer Science, 2018, 45(11A): 382-388. |
[9] | XIONG Wan-zhu, LI Xiao-yu. Mobile Location Privacy Protection Based on Anonymous Routing [J]. Computer Science, 2018, 45(10): 142-149. |
[10] | YANG Yue-ping, WANG Jian and XUE Ming-fu. Hierarchical Privacy Protection of Multi-source Data Fusion for Sensitive Value [J]. Computer Science, 2017, 44(9): 156-161. |
[11] | LIAO Jun, JIANG Chao-hui, GUO Chun and PING Yuan. Classification Anonymity Algorithm Based on Weight Attributes Entropy [J]. Computer Science, 2017, 44(7): 42-46. |
[12] | LIU Yan and ZHANG Lin. Improved Location Anonymous Technology for Big Data Based on Bloom Filter [J]. Computer Science, 2017, 44(6): 144-149. |
[13] | LU Jie, SONG Xiang-mei, HAN Mou and ZHOU Cong-hua. Batch Verification Scheme Defensing Collusive Attack in VANET [J]. Computer Science, 2016, 43(6): 135-140. |
[14] | DAI Jia-zhu and HUA Liang. Method of Anonymous Area Generation for Sensitive Location Protection under Road Networks [J]. Computer Science, 2016, 43(3): 137-144. |
[15] | WANG Hai-ping and ZHAO Jing-jing. Ciphertext-policy Attribute-based Encryption with Anonymous Access Structure [J]. Computer Science, 2016, 43(2): 175-178. |
|