Unmanned aerial vehicle(UAV)has been widely used because of its characteristics of flexibility,low cost,etc.With the rapid development of artificial intelligence and UAV technology,there will be more and more UAVs which can perform tasks without human real-time control.A UAV network with UAV application as its core has the characteristics of high mobility,dynamic topology,intermittent links,changing link quality,etc.In the UAV network,it is important to ensure that the commands which are sent to the UAV come from authorized command agencies and have not been tampered with.Generally,it uses digital signature to protect the integrity and authentication of commands.Considering the characteristics of UAV network,it is of great significance for the further promotion and application of UAV to propose digital signature schemes which are suitable for the UAV network.It proposed digital signature schemes which meet different requirements and analyzed these schemes in this dissertation in order to protect the integrity and authentication of messages in the UAV network.In the case that a user rents a UAV to perform tasks,it researches and constructs a digital signature scheme in which the UAV can receive the signature in time and this signature can only be verified by the designated UAV.Moreover,this signature scheme can protect the privacy of user.In the case that a UAV can not communicate reliably with a certificate authority,it researches and constructs a digital signature scheme in which the UAV can receive the signature in time and this signature can only be verified by the designated UAV.It researches and constructs a digital signature scheme in which the UAV can receive the signature in time and this signature scheme can protect the privacy of signer.The main research results of this dissertation include:1.Aiming at the problem of integrity and authentication protection of messages in UAV networks,it proposed a designated verifier proxy blind signature scheme for UAV networks based on mobile edge computing.When a user rents a UAV to perform tasks,the UAV can receive the command and digital signature in time and this signature can only be verified by the designated UAV.Moreover,the signer does not know the content of command,which protects the privacy of user.It proved security of this signature scheme.The results indicate that this scheme has existential unforgeability.It analyzed efficiency of the proposed signature scheme in terms of computation costs and communication costs and compared with other related signature schemes.The results indicate that computation costs of the proposed signature scheme are smaller than those of most of other related schemes,but communication costs of the proposed scheme are larger.2.Aiming at the problem of integrity and authentication protection of messages in UAV networks and the problem of digital certificate management,it proposed a certificate-less designated verifier proxy signature scheme for UAV networks.Considering the characteristics of UAV networks,it is difficult for a UAV to obtain the digital cer-tificate of signer and update the certificate revocation list in time.Traditional digital signature schemes are not fully suitable for UAV networks and identity-based digital signature scheme has key escrow problem.Meanwhile,the UAV needs to receive the command and digital signature in time and this signature can only be verified by the designated UAV.Therefore,it proposed a certificateless designated verifier proxy sig-nature scheme for UAV networks and proved its security.The results indicate that this scheme has existential unforgeability.It analyzed efficiency of the proposed signature scheme in terms of computation costs and communication costs and compared with other related signature schemes.The results indicate that computation costs of the proposed signature scheme are smaller than those of most of other related schemes and communication costs of the proposed scheme are smaller than those of the same type of scheme.3.Aiming at the problem of integrity and authentication protection of messages in UAV networks and the problem of privacy protection of signer,it proposed attribute-based proxy signature schemes for UAV networks.In some applications,it requires not only the UAV can receive the command and digital signature in time,but also this signa-ture does not reveal the identity of signer to protect the privacy of signer.Therefore,it proposed attribute-based proxy signature schemes for UAV networks.First,it pro-posed an attribute-based proxy signature scheme with single attribute authority and proved its security.The results indicate that this scheme has existential unforgeability and can protect the privacy of signer.It analyzed efficiency of the proposed signa-ture scheme in terms of computation costs and communication costs and compared with other related signature schemes.The results indicate that the proposed signature scheme has smaller computation costs and larger communication costs.Then,aim-ing at the problem of attribute management of attribute-based proxy signature scheme with single attribute authority,it proposed a multi-authority attribute-based proxy signature scheme and analyzed its security and efficiency.The results indicate that this signature scheme has existential unforgeability and can protect the privacy of signer.This signature scheme has smaller computation costs when it has fewer attribute authorities.Meanwhile,communication costs of the proposed scheme are larger because of the existence of multiple attribute authorities. |