Abstract

Intelligent transportation systems (ITS) have always been an important application of Internet of Things (IoT). Today, big data and cloud computing have further promoted the construction and development of ITS. At the same time, the development of blockchain has also brought new features and convenience to ITS. However, due to the endless emergence of increasingly advanced types of attacks, the security of blockchain-based ITS needs more attention from industry and academia. In this paper, we focus on exploring the primitives in cryptography to guarantee the security of blockchain-based ITS. In particular, the authentication, encryption, and key management schemes in cryptography are discussed. Furthermore, we propose two methods for achieving the threshold key management in blockchain-based ITS. The proposed threshold key management scheme (with threshold t ) enables various stakeholders to recover a secret if the number of participated stakeholders is at least t . It should be noted that the proposed threshold key management scheme is efficient and secure for multiple users in blockchain-based ITS, especially for the data-sharing scenario.

Highlights

  • Nowadays, Internet of ings (IoT) [1, 2] have experienced unprecedented development due to the widespread of big data and cloud computing [3]

  • Consistency means that the data in intelligent transportation systems (ITS) meets the entity integrity. e auditing scheme in cryptography can be employed to protect the integrity and consistency of ITS

  • Cryptography plays a vital role in protecting the security of ITS

Read more

Summary

Introduction

Internet of ings (IoT) [1, 2] have experienced unprecedented development due to the widespread of big data and cloud computing [3]. E auditing scheme in cryptography can be employed to protect the integrity and consistency of ITS. E. Security and Communication Networks main research topics of modern cryptography include information encryption, digital signatures, data integrity, and identity authentication. The concept of unconditional security was proposed. Based on this concept, one-time pad (OTP) [11] is unconditional security; that is, even if an attacker has unlimited computing resources, it is impossible to decipher the ciphertext encrypted by OTP. The threshold key management scheme is designed based on the (t, n) threshold secret sharing, which is an efficient and secure cryptography primitive.

Related Works
Secret-Sharing Schemes
Threshold Key Management for Database Security
Data storage Cloud
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.