{"title":"基于短组签名的数据源可信认证方案","authors":"Zhu Jinhui, Liu Xin, Shen Peipei, Xin Xiaopeng, Chen Kai, Zheng Guiping","doi":"10.1109/ASSP54407.2021.00033","DOIUrl":null,"url":null,"abstract":"With the rapid development of Internet application service related industries, the Internet of things, as an extension and expansion of Internet application services, has introduced new security risks in the process of various services. These security risks bring direct losses and broader potential threats to users and service providers of application services. This inevitable and substantial threat increasingly restricts the further promotion and development of the Internet of things, and trusted computing technology provides a new direction for the continuous development of the Internet of things. Therefore, the research on various application service modes and implementation processes related to the Internet of things has become the focus in the field of the Internet of things. The main content and work of this chapter is based on the existing signature technology and combined with the application background of the data transmission process in the Internet of things, to study and design a scheme for realizing the trusted authentication of the data source in the data transmission process of the Internet of things.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"6 2","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Trusted Authentication Scheme for Data Source Based on Short Group Signature\",\"authors\":\"Zhu Jinhui, Liu Xin, Shen Peipei, Xin Xiaopeng, Chen Kai, Zheng Guiping\",\"doi\":\"10.1109/ASSP54407.2021.00033\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid development of Internet application service related industries, the Internet of things, as an extension and expansion of Internet application services, has introduced new security risks in the process of various services. These security risks bring direct losses and broader potential threats to users and service providers of application services. This inevitable and substantial threat increasingly restricts the further promotion and development of the Internet of things, and trusted computing technology provides a new direction for the continuous development of the Internet of things. Therefore, the research on various application service modes and implementation processes related to the Internet of things has become the focus in the field of the Internet of things. The main content and work of this chapter is based on the existing signature technology and combined with the application background of the data transmission process in the Internet of things, to study and design a scheme for realizing the trusted authentication of the data source in the data transmission process of the Internet of things.\",\"PeriodicalId\":153782,\"journal\":{\"name\":\"2021 2nd Asia Symposium on Signal Processing (ASSP)\",\"volume\":\"6 2\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd Asia Symposium on Signal Processing (ASSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ASSP54407.2021.00033\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd Asia Symposium on Signal Processing (ASSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASSP54407.2021.00033","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trusted Authentication Scheme for Data Source Based on Short Group Signature
With the rapid development of Internet application service related industries, the Internet of things, as an extension and expansion of Internet application services, has introduced new security risks in the process of various services. These security risks bring direct losses and broader potential threats to users and service providers of application services. This inevitable and substantial threat increasingly restricts the further promotion and development of the Internet of things, and trusted computing technology provides a new direction for the continuous development of the Internet of things. Therefore, the research on various application service modes and implementation processes related to the Internet of things has become the focus in the field of the Internet of things. The main content and work of this chapter is based on the existing signature technology and combined with the application background of the data transmission process in the Internet of things, to study and design a scheme for realizing the trusted authentication of the data source in the data transmission process of the Internet of things.