An Efficient Certificateless Aggregate Signcryption Scheme in V2G
DOI: 10.23977/jeeem.2023.060108 | Downloads: 20 | Views: 442
Author(s)
Baoyi Wang 1, Ronghua Yi 1, Shaomin Zhang 1
Affiliation(s)
1 School of Control and Computer Engineering, North China Electric Power University, Baoding, Hebei, 071003, China
Corresponding Author
Baoyi WangABSTRACT
When EVs are charging and discharging or enjoying other services, it is crucial to protect the communication data between electric vehicles and charging service control centers. Guaranteed confidentiality and y-verification of information, and it takes a long time to verify when a large number of EV users are signing confidentiality at the same time. For those problems. We proposes a certificate-free aggregated signcryption scheme for V2G based on the assumption of Diffie-Hellman difficulty problem. A bilinear mapping operation is used to add the identity information of EV users and charging service companies into the signature and ciphertext respectively to hide the user identity information. In the aggregation verification phase, only two fixed bilinear mapping operations are used, which can effectively improve the computational efficiency.
KEYWORDS
V2G, Electric vehicle, Certificateless aggregate signcryptionCITE THIS PAPER
Baoyi Wang, Ronghua Yi, Shaomin Zhang, An Efficient Certificateless Aggregate Signcryption Scheme in V2G. Journal of Electrotechnology, Electrical Engineering and Management (2023) Vol. 6: 42-48. DOI: http://dx.doi.org/10.23977/jeeem.2023.060108.
REFERENCES
[1] Zhong W, Yu R, Xie S, Zhang Y, Yau DKY. On stability and robustness of demand response in V2G mobile energy networks. IEEE Trans Smart Grid 2018; 9(4): 3203–12.
[2] Li H, Han D, Tang M. A privacy-preserving charging scheme for electric vehicles using blockchain and fog computing. IEEE Syst J 2021; 15(3):3189–200.
[3] Danish SM, Zhang K, Jacobsen H-A, Ashraf N, Qureshi HK. BlockEV: Efficient and secure charging station selection for electric vehicles. IEEE Trans Intell Transp Syst 2021; 22(7):4194–211.
[4] Saxena N, Choi B J. Authentication scheme for flexible charging and discharging of mobile vehicles in the V2G networks[J].IEEE Transactions on information Forensics and Security, 2016, 11(7):1438-1452.
[5] Fuan Chen, Yi Liu. Blockchain-based V2G ring-signature privacy protection scheme without certificate [J]. Computer Engineering, Pages: 1-10, FEB 2023. https://doi.org/10.19678/j.issn.1000-3428.0065767.
[6] Liu C L, You L. A certificateless aggregate signature scheme [J]. Journal of Hangzhou Dianzi University (Natural Sciences), 2019, 39(6):12-17.
[7] Wang Z Y, Liu J W, Zhang Z Y, et al. Full anonymous blockchain based on aggregate signature and confidential transaction[J]. Journal of Computer Research and Development, 2018, 55(10):2185-2198.
[8] Wang Y J, Ding Y, Wu Q H, et al. Privacy-preserving cloud-based road condition monitoring with source authentication in VANETs[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(7):1779- 1790.
[9] Wang H, Wang Q, He D, et al. BBARS: Blockchain-based anonymous rewarding. Scheme for V2G networks [J].IEEE internet of Things Journal, 2019, 6(2):3676-3687.
[10] Liu J H, Zhao C X, Mao K F. Efficient certificateless aggregate signcryption scheme based on XOR [J]. Computer Engineering and Applications, 2016, 52(12): 131-135.
[11] Niu S F, Niu L, Wang C F, et al. Privacy-preserving multi-recipient aggregate signcryption for heterogeneous cryptography systems[J]. Computer Engineering & Science, 2018, 40(5):805-812.
Downloads: | 2110 |
---|---|
Visits: | 99280 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks