Abstract
Secure data sharing for the Internet of Vehicles (IoV) has drawn much attention in developing smart cities and smart transportation. One way to achieve that is based on the reputation of the participant vehicles and the interaction between them. Most of the reputation adjustment schemes are aimed at single-secret situations, and there are cases where shared information leaks after reconstruction; and the shared information of all participants need to be updated again. This paper uses binary asymmetric polynomials to realize the asynchronous reconstruction of secrets, that is, multiple secrets are distributed at once, and each secret is independent of each other when it is restored. Each participant holds the shared divided information part of a one-variable polynomial. When the secret is reconstructed, the shared information part is not directly shown to ensure that the shared information is not leaked. Furthermore, we provide another way to keep the secret unchanged and modify the secret threshold.
1. Introduction
The Internet of Vehicles (IoV) is an important branch of the Internet of Things in the field of intelligent transportation. It is the main goal of improving traffic safety, transportation efficiency, and so on. In recent years, IoV has received extensive attention from academia and industry. IoV integrates technologies in multiple fields such as electronics, information, and transportation, and provides various types of information services by collecting road traffic equipment sensor data and communicating information between nodes in real-time. Information services usually use appropriate information distribution methods to push service data to specific vehicles [1], to achieve intelligent traffic management and vehicle intelligent control, and other purposes.
In IoV, due to the strong mobility and a large number of vehicles, secure information distribution in transportation services mainly adopts the form of broadcasting. Among them, a roadside unit (RSU) collects various types of traffic service information and sends service data to mobile vehicles through a wireless broadcast channel. Due to the open characteristics of the wireless network, the transmitted data are easily eavesdropped on and tampered within the link, resulting in data modification and loss [2]. Attackers can use wireless channels to deliberately inject false information and eavesdrop on broadcast messages in wireless channels, which seriously violates the privacy of drivers and endangers the safety of public transportation. In addition, on the Internet of Vehicles, the information that needs to be distributed is mainly traffic service information. If traffic service information cannot be accurately distributed to specific vehicles according to the current traffic situation, it will not only seriously affect the quality of information services but also may even reduce the level of road network operation and affect residents’ travel experience. Therefore, it is of great significance to construct the safe and accurate distribution of information under the framework of IoV [3].
One way to achieve secret data sharing for IoV is the reputation scheme. The reputation value of the participants will be dynamically adjusted along with the participation process and is a long-term cumulative effect, and there are situations in which the number of participants and secret values are dynamically changed. The secret sharing in IoV generally consists of three parts: secret distribution, dynamic adjustment, and secret reconstruction. Compared with the traditional secret-sharing scheme, the dynamic adjustment process is added. In the process of social dynamic adjustment, the scheme dynamically adds, deletes participants, and dynamically changes the secret value according to the reconstruction situation; the scheme will be based on each participant in the secret reconstruction process. The interactive behaviors between each other are evaluated for each other, each person’s reputation value is adjusted, and then the amount of each person’s share deposit is adjusted according to each reputation value.
In summary, we propose a multisecret reputation adjustment scheme, which details the specific implementation of the dynamic adjustment of the reputation weight value when the scheme distributes multiple secret values on the Internet of Vehicle at a time. The solution can realize the situation of distributing multiple secret values at once, which proves the asynchronous and independent reconstruction of multiple secrets, and during the secret reconstruction, the security of the shared information is guaranteed by showing the subsecret value instead of directly showing the shared information; after the construction is completed, the program can dynamically adjust the reputation value based on the interactive behavior between participants. At the same time, it is proved that when a participant conducts a collision attack, the attacker cannot steal other unrecovered secrets value-related information, ensuring the security of the unrecovered secret. Furthermore, we provide another way to keep the secret unchanged and modify the secret threshold. The idea is to share the existing shares of the participants again, and then use the Vandermonde matrix to modify the threshold from t to t′.
2. Related Work
Since the data on the Internet of Vehicles directly affects the lives and property safety of personnel, it is particularly important to ensure the safety of their data. On the Internet of Vehicles, the confidentiality, integrity, reliability, and nonrepudiation of data need to be guaranteed [4], and so on. Different from the traditional network, the Internet of Vehicles is in an open environment, and vehicles enter and exit the network frequently, and the existence of malicious node intrusion cannot be ruled out. Known types of attacks include eavesdropping, tampering, suppression, and replay of information, DoS attacks that deliberately disrupt the network, injection of false information, etc., which will cause real information to be modified, delayed, and discarded, and false information floods the network, causing serious problems and consequences [5]. In response to these security issues, most of the existing research work mainly focuses on identity authentication, privacy protection, false message filtering, and malicious node detection [6].
The identity authentication mechanism based on public key infrastructure (Public Key Infrastructure, PKI) was first introduced to the Internet of Vehicles. Selvalakshmi et al. [7] designed a scheme based on digital certificates, in which the user confirms the sender’s identity by verifying the certificate issued by the trusted center. However, the existence of a large number of certificates has increased the storage management burden of the certification center. To this end, Biswas et al. proposed an identity-based authentication framework, which generates a user’s public key through the user’s identity, and uses the correspondence between the public and private keys to achieve identity authentication [8]. To improve the efficiency of identity authentication, Bayat et al. proposed a framework that supports batch identity authentication, which improves the real-time nature of authentication [9]. Regarding privacy protection, there are two main privacy issues on the Internet of Vehicles: identity privacy and location privacy. To protect the privacy of user identity, Chim et al. proposed a pseudonym substitution scheme. The calculated pseudonym is used to represent the user’s identity so that the attacker cannot know the user’s real identity [10]. He et al. [11] also proposed an identity authentication scheme with a privacy protection function and realized conditional privacy by storing pseudonyms in the design management center. To achieve location privacy protection, Shokri et al. used the k-anonymity method to obscure the user’s location information so that the attacker could not distinguish the vehicles in the anonymous set [12]. Sun et al. also used the concept of the mixed zone to obscure vehicle location attribute to protect privacy [13].
On the Internet of Vehicles, vehicles can broadcast messages arbitrarily, and there are many false messages to deliberately disrupt the network. For this reason, Caballero-Gild et al. proposed a reputation mechanism, which evaluates the credibility of messages by defining the similarity between vehicle contents, and discards messages whose reputation is less than a set threshold [14]. Guo et al. [15] set a series of rules to correlate messages between vehicles for cross-validation, thereby filtering false messages.
To detect malicious nodes, Zaidi et al. [16] used statistical methods to detect malicious nodes spreading false messages in the network and established a vehicle network intrusion detection system model. Daeinabi et al. [17] set up a special verification node to detect malicious nodes by observing abnormal messages transmitted on the Internet of Vehicles. Many scholars have also proposed solutions based on trust management. For example, Li et al. [18] proposed a trust management framework, which comprehensively evaluates the trust of the vehicle through the vehicle’s attributes and feedback information from other vehicles, and realizes the detection of malicious nodes. In addition to the abovementioned research issues, it is essential to ensure the safe distribution of information.
Information distribution mostly uses broadcast [19], and the transmitted data is more vulnerable to attacks in wireless channels. Security and privacy have become the most important research issues in information distribution on the Internet of Vehicles [20]. Information distribution, as one of the common application scenarios of the Internet of Vehicles, pays more attention to the confidentiality and integrity of the distributed information. Existing research mainly focuses on secure communication mechanisms, secure authentication technology, and access control technology [21].
The security communication mechanism is mainly studied to ensure the confidentiality of information through encryption and other means [22]. Raya and Hubaux [23] and others use PKI technology to ensure the secure communication of vehicles and to protect the identity of the vehicle through an anonymous public key, to a certain extent, to achieve secure and anonymous communication. Federrath et al. [24] use the Diffie–Hellman algorithm for key agreement and encrypt information according to the negotiated symmetric key to realize the secure communication between the RSU and the vehicle. Zhu et al. [25] achieve secure communication between vehicles and vehicles and infrastructure through lightweight symmetric cryptography.
Security authentication technology includes message authentication and identity authentication. Among them, the main purpose of message authentication is to verify that the message has not been tampered with. To this end, Mondal et al. [26] proposed a timestamp-based hash algorithm, which generates a digest to verify message integrity. The main purpose of identity authentication is to authenticate legitimate users. Liu Hui et al. [27] proposed a group key management mechanism based on traditional identity authentication technology to realize identity authentication within the group while reducing the burden of the key management center. Given the privacy risks that identity authentication will bring, there are also related scholars to achieve privacy protection by constructing vehicle groups [28] and anonymity [29].
Access control is an important technical means to realize the confidentiality and integrity of information. It ensures that only legitimate users can access protected resources and prevents unauthorized users from unauthorized access. With the introduction of new public-key cryptosystems such as attribute-based encryption, new methods are provided for access control of encrypted data [30]. Huang et al. introduced the attribute-based encryption method based on ciphertext strategy to the Internet of Vehicles for the first time and proposed an attribute-based security policy formulation framework to achieve fine-grained access control during message sending [31]. In addition, given the problem that attribute-based encryption algorithms are time-consuming and difficult to apply to the Internet of Vehicles environment with high real-time requirements, relevant scholars have studied outsourcing computing solutions and safely outsourced some complex operations to a third party, which improved the efficiency of vehicle decryption [32]. Nojoumian et al. used the resharing method to reconstruct the polynomial with the sub-secret information as the secret value, and distributed it, and then used the symmetric encryption formed by the symmetric polynomial to encrypt the distributed information to ensure the security of the distributed information [33]. Harn and Hsu used binary symmetric polynomials to distribute multiple secret information and realized the distribution of multiple secrets at a time, but they could not resist the collusion attack of k − 1 participants after recovering the secret value [34].
3. Multisecret Reputation Adjustment Scheme
3.1. Overview of the Secret-Sharing in the IoV
In the secret sharing of the Internet of Vehicles, the credibility of the distributor and the security of the interaction channel between distributors and participants should be ensured during distribution. The distributor determines the initial reputation value for each participant, and each participant receives the same amount of stored information as to its reputation value at initialization. Many times in secret reconstruction according to each of the participants in the process of reconstruction in the process of the interaction between the behavior and dynamic adjustment of the popularity of the participants’ weight value, to improve the popularity of the cooperative participant values, to make its increase in the number of points to save information, to reduce the reputation of the not cooperative participant, to reduce its holdings of points to save information, namely make the cooperation of participants higher than not-cooperative participant’s reputation, more storage values are received. The specific scheme is described as follows:
3.1.1. Secret-Sharing Phase
(1)In the secret sharing scheme of the Internet of Vehicles of , the participant represents the -th participant, and each participant holds a reputation value of . Suppose the distributor randomly constructs a polynomial of order , (The constant value is the secret information, that is, ); according to the reputation value of participant , the distributor calculates the shared information part and sends the corresponding parts to the participant , after which the distributor leaves the scheme. Generate shared information part values and send them to participants according to the following formula: where , is the maximum weight of all participants, , represents the -th shared information part of the -th participant. After the secret value is reconstructed once each time, the reputation of the participants is dynamically adjusted and updated according to their behaviors in the last reconstruction process.(2)Let represent the identity matrix of participants, where is the number of participants, is the maximum weight value of all participants, elements in are different nonzero elements on , and represents a finite field. For example, in the case of , where the elements and are identifiers for participant , and and are identifiers for participant . The distributor assigns each participant a corresponding amount of stored information based on their reputation value:
3.1.2. Secret Refactoring Phase
(1)When the sum of weights of reconstructed participants is greater than or equal to the threshold value, the secret value can be reconstructed, and the subsecret value of each participant can be obtained by using the shared information part calculation formula (3):(2)After calculating for each participant, the secret value can be obtained by calculating using fformula (4):
3.1.3. Reputation Adjustment Phase
In the secret sharing of the Internet of Vehicles, the weight information of participants’ reputation is open, so the secret distributor can dynamically adjust the stored information held by participants according to the reputation value of participants in each round. In the whole process of social adjustment, when the participant’s reputation value increases, it can activate the new identity of the participant and assign it the new shared information part value. When the reputation value of participants decreases, the corresponding identity information value can be frozen according to the reputation value, and the corresponding shared information part can be canceled, to achieve the purpose of reducing the reputation of noncooperative participants.
In the process of reputation adjustment, after a secret restoration, the shared deposit information held by participants will be insecure. Therefore, the shared deposits in the scheme are mostly one-time, and the new identity of the participant is calculated after the information, the sharing information held by all participants needs to be updated.
When the reputation of the participant increases, a new identity is activated for the participant, and a new shared information value is assigned to it. The specific plan is as follows:
(1) Freeze noncooperative participants. If the weight of an existing participant is one, the participant’s weight is frozen to exit the secret-sharing system. At this point, according to the adjustment of the social trust function mentioned in section 2, a polynomial with a constant term of zero should be generated again to update the storage of all participants so that frozen participants only hold the old storage, and the secret cannot be recovered in the new polynomial.
If the weight of an existing participant is greater than one, its weight value is reduced by one. At this point, a polynomial with a constant term of zero is generated to update the storage of all participants, making it no longer applicable to freeze the old points in the new polynomial.
(2) Activate partner. If it is a new participant, a new identity matrix is assigned to it, the new shared information part is assigned to it, and its weight is one. If an existing participant is assigned a new deposit, its weight value is increased by one.
Participant The new identity information of the participant can be calculated by using the formula , and each participant can be calculated by using the shared information part formula:where is calculated by each participant and sent to the address of the participant. The address of the participant calculates the information according to the received information and obtains the information , as shown in formula (6), then is the newly allocated shared information part of the address of the participant:
3.1.4. Update Storage Phase
After recovering the secret information once, the stored information held by each participant will be disclosed. In this case, the shared information part held by all participants needs to be updated again to ensure the security of secret information. All participants use the stored information as the secret value to reconstruct the polynomial, each participant distributes the constructed polynomial using the resharing algorithm, and each participant updates the stored information held by the participant using formula (6). The specific scheme is as follows:(1)Each participant randomly selects a polynomial with the highest degree of , which satisfies , and then sends to the participant , that is, the constant of the polynomial constructed by each participant is the score held by the participant store information, and each participant constructs a corresponding number of polynomial values based on the reputation value he holds and distributes them.(2)Each participant calculates the new substorage value by using the shared information part received from other participants, as shown in formula (7): here , represents the identity of the participant, is the corresponding reputation value of the participant, and the corresponding identity is calculated to represent the new subshare value of the participant .(3)Each participant calculates the secret value using the new submemory value.
3.2. Design of the Proposed Scheme
In this section, an asynchronous multisecret reputation adjustment sharing scheme is proposed by using binary asymmetric polynomials to distribute multiple secret values and realize the asynchronous reconstruction of secret values. In the process of secret reconstruction, the reputation weight value of participants is dynamically adjusted according to their behaviors so that the next secret recovery process is independent of the last secret recovery process, and the related information of the unrecovered secret value will not be disclosed.
In the reputation adjustment, when the reputation value in the plan increases, each participant allocates the new to share information for the increased reputation value. There are the following situations: first, after performing a secret recovery process, the reputation of the participants is adjusted according to the behavior of the participants, but because they share information held by each participant has been leaked when the secret was restored last time, it is necessary to update the points held by each participant. Second, in this scheme, only one secret information can be shared in one secret distribution. When multiple secrets are recovered, multiple secret distribution processes are required. This paper studies the above problems and proposes a multisecret reputation adjustment scheme using binary asymmetric polynomials.
3.2.1. Security Model
The social secret sharing model proposed in this paper consists of participants and a distributor (visible only in the initialization phase), and the threshold is . It is assumed that there is a private channel between each pair of participants (used in the reputation adjustment process), and the distributor can communicate securely with each participant when distributing the shared information. At the same time make the following assumptions:(1)The maximum value of reputation weight held by each participant should be less than the threshold value to ensure that a single participant cannot recover the secret value; during the secret reconstruction, the sum of the weights of the number of participants should be greater than or equal to the threshold value to ensure that the participants can recover the secret value. In secret refactoring, each participant must honestly present all stored information values.(2)Participants’ reputation value and identification information of each round are made public, and the public information is guaranteed to be safe and reliable.(3)When the participant’s reputation value decreases, the participant can honestly freeze the reduced participant id and destroy the stored information held.(4)All participants are rational participants, that is, there is no cheating.
3.2.2. Phases of the Scheme
This scheme can distribute multiple secret values at once while ensuring that the recovered secret values and collusive attackers cannot obtain information about other unrecovered secret values. Afterward, for the proposed scheme, the correctness of the reconstructed secret and the security of the secret value and shared information are analyzed and proved. The existing schemes are analyzed and compared in terms of reputation adjustment and the distribution of multisecret values. The proposed multisecret reputation adjustment scheme includes four phases: initialization, secret distribution, secret reconstruction, and reputation adjustment. The specific scheme is as follows:
(1) Initialization Phase. In the initialization phase, the corresponding parameters are introduced. In the scheme, is a large prime number. Zp is a finite field. are distributed multisecret values, where . is the threshold, and is the number of participants. represent the set of participants. The identification information of each participant is . is the number of participants in the reconstruction of the secret.
(2) Secret Distribution Phase(1)Assuming that participant represents the -th participant, the distributor assigns an initial reputation value to each participant, and each participant holds a reputation value of .(2)The multisecret values are , and the distributor randomly constructs a binary asymmetric polynomial , the highest degree of , is , and represents a large prime number, where the multisecret value satisfies the conditions , , , , as shown in formula (8): where is an integer value other than zero, where .(3)The reputation value of the participant is , and the distributor calculates the corresponding identity for the participant according to the reputation value , where m is the largest weight among all participants, and . represents the -th identity information of the -th participant, and it is sent to the corresponding participant , and the identity of each participant is .(4)The distributor uses the participant’s identity to calculate the sharing information , where represents the -th sharing information of the -th participant, and sends the sharing information to the corresponding participant , then each participant holds a univariate polynomial containing , and the highest power is .
(3) Secret Refactoring Phase(1)Suppose that when participants want to reconstruct the secret value , at this time, it is only necessary to satisfy that the sum of the weights of the reconstructed participants is not less than the threshold to reconstruct the secret, as shown in formula (9):(2)Each participant uses a univariate polynomial to share the information to calculate , and then uses formula (10) to calculate the sub-secret value:(3)After each participant calculates , and sends to the reconstructed participant, the secret value can be obtained by using formula (11) for calculation:
(4) Reputation Adjustment Phase(1)On the Internet of Vehicles, after the secret reconstruction according to the above scheme is completed, the reputation is dynamically adjusted according to the interactive behavior between the participants. As shown in Figure 1, when the reputation value of a participant decreases, the participant freezes a corresponding amount of identification information value according to the reputation value and cancels the corresponding shared information to achieve the purpose of reducing the reputation of noncooperative participants.(2)When the reputation value of a participant increases, the scheme in this section can be used to activate a new identity for the participant and assign a new shared information value to it, and there is no need to reupdate the shared information of all participants, and the security of unrecovered secret information can still be guaranteed.(3)The distributor judges whether it meets according to the request for activating the new identity sent by the participant . If so, the distributor uses to calculate the new identity information of the participant and uses the participant’s identity to calculate the new share information , represents the -th share information of the -th participant, and the share information is sent to the corresponding participant . At this time, the sharing information of other participants remains unchanged.(4)After each participant updates his reputation value and the shared information part he holds, suppose that when k participants want to reconstruct the secret value S, each participant calculates and sends to the reconstructed participant, using formula (11) to calculate, you can get the secret value.

Here is a simple example:(1)Encryption process: Suppose there is a secret , take random numbers . Let , construct the following polynomial: , in which all operations are performed in the finite field . Take any numbers , substitute them into the polynomial to obtain , and store on nodes, respectively.(2)Decryption process: Take any data on k nodes, assume a, b, and c, substitute them into the formula and solve polynomial coefficients: It is represented by matrix multiplication as follows:
After obtaining , the polynomial can be constructed, and the original secret can be obtained by substituting into the polynomial.
3.3. Scheme Analysis
In the last section, this paper introduced the concrete implementation of the multisecret reputation adjustment scheme. The following subsection will mainly analyze and discuss the correctness and security of secret reconstruction in the process of secret reconstruction and prove the correctness and feasibility of the scheme. It also analyzes and compares the existing schemes in terms of reputation adjustment and distribution of multisecret value.
3.3.1. Proof of the Correctness of Reconstruction
Theorem 1. When the number of reconstructed participants meets formula (9), that is, when the sum of weights of reconstructed participants is not less than the threshold value, the correct secret value can be reconstructed.
Assuming that participants meet formula (9) to reconstruct the secret value , each participant calculates , and the formula is used to calculate the secret value in the scheme. The proof is as follows.(1) participants reconstruct the secret, and the reputation weight of each participant is . Therefore, according to the Lagrange interpolation polynomial, it can be known that when the sum of the reputation weights of the participants is greater than or equal to , the participant can reconstruct the secret value. The number of participants shown in the following table is , the reputation weight of each participant is , and is the secret reconstruction of participants. The specific conditions of the participants are shown in Table 1.(2)The sharing information of each participant is , which is a univariate polynomial containing , and the highest power is . By calculating , a specific value can be calculated. At this time, according to formula (3)‒(11): The two-variable polynomial is transformed into a traditional one-variable polynomial. At this time, the Lagrange formula is used to calculate the secret value . The proof is as follows:
3.3.2. Proof of Secret Security
Theorem 2. The reconstruction process between the secret is independent of each other, that is, it can realize the asynchronous reconstruction of the secret, after reconstructing a secret value, the recovered secret value and other k participants satisfying formulas (3)–(8) cannot obtain the relevant information about the unrecovered secret value.
If secret information has been reconstructed at this time, participants who satisfy formulas (3)–(8) conduct a collision attack (plus the secret value that has just been recovered) to obtain other unrecovered secret values .When participants hold the shared storage and the secret value for a conspiracy attack, due to , and the binary asymmetric polynomial has a total of coefficients, when a secret value is restored, the participants hold the shared information of the unary polynomial with the unknown coefficient , and only the points of the polynomial can be obtained. Therefore, the relevant information of the unrecovered secret value cannot be obtained. Therefore, the relevant information of the unrecovered secret value cannot be obtained.
The proof is as follows:where .
3.4. Scheme Comparison
By constructing a binary asymmetric polynomial with the highest degree of and being , the article ensures that the secrets are independent of each other. The distributor only needs to perform the distribution process once, which can realize the asynchronous reconstruction of multiple secrets. After the secret information is reconstructed once, the stored information of each participant will not be disclosed, and the unrecovered secret information can still be reconstructed. Article [33] discusses the sharing of single-secret value. After a secret reconstruction is completed, all shared information parts must be updated, otherwise, the secret value will be leaked. The specific comparison is shown in Table 2.
In the process of reputation adjustment, if the reputation value of the participants’ increases, the distributor can improve the reputation value by calculating the identity information and storing information for the participants. It does not require the participants of the distributor but needs to re-update the sharing information of all participants by self-selection. In the article [34], a bivariate symmetric polynomial is used to realize the multisecret asynchronous reconstruction process. However, after completing a secret reconstruction, other unrecovered secret values will be illegally stolen by participants, so the security of asynchronous reconstruction of secrets cannot be guaranteed.
It can be found from the above table that this article has realized asynchronous multisecret reputation adjustment, which can reconstruct specific secret values asynchronously, and the recovery of each secret value is independent of each other, and the reputation value can be dynamically increased and decreased. And when the reputation is dynamically adjusted, there is no need to update the sharing information held by the participants, but the participation of the distributor is required in the process of adjusting the reputation.
4. Modified Threshold Scheme Based on Vandermonde Matrix
4.1. Conditions for Common Nonzero Solutions of -Element Homogeneous Linear Systems
Let be the matrix, and the basic solution system of the homogeneous linear equations of is .
Theorem 3. The necessary conditions for n-variable homogeneous linear equations to have nonzero common solutions are the following:
, ,…, () are Linearly related.
Proof. Suppose , which is the basic solution system of , and is the nonzero common solution of . Then can be expressed linearly by and set to , where are not all zero. From , we can getSince are not all zero, , ,…, are linearly related.
Inference For two n-variable homogeneous linear equations , assuming that are the basic solution system of a2, the necessary and sufficient conditions for and to have a nonzero common solution are the following: are linear related.
Proof. (necessity). Suppose is a nonzero common solution with , then can be expressed linearly by , set , where are not all zero.
From , we can getTherefore, are linearly related.
(Sufficiency) Since are linearly related, there are numbers that are not all zeros, so thatLet , then is the solution of , and satisfies , then is the common solution of .
Theorem 4. The necessary and sufficient conditions for the -variable homogeneous linear equations to have nonzero common solutions are
Proof. (necessity). Suppose the nonzero common solution of the -variable homogeneous linear equations is , that is, , so thathas a nonzero common solution, so(Sufficiency) Since , the linear equations , has a nonzero solution, set to , that is, .Thus, , that is, is a nonzero common solution of .
Theorem 5. The necessary and sufficient conditions for the -variable homogeneous linear equations to have nonzero common solutions are the following:Proof (necessity). Since the solutions of are all solutions of , then and have the same solution, then , similarly, we can prove that.
(Sufficiency) Since the solution of must is the solution of . Therefore, the basic solution system of is the solution of . And from , it can be known that the number of basic solution systems of and are the same, so their basic solution systems are equivalent, so and have the same solution. Similarly, we can prove that and have the same solution.
4.2. The Conditions for Multiple Nonsublinear Equations to Have Nonzero Common Solutions
Theorem 6. The -variable nonhomogeneous linear equations all have solutions, so the necessary and sufficient condition for them to have nonzero common solutions is that their derived groups have nonzero common solutions.
Proof (necessity). Let x be the meaning of any x of the derived group x1, x2, and x3, then a is the solution of b and also the solution of ab, which proves that x1, x2, and x3 have nonzero common solutions.
(Sufficiency) According to the condition and Theorem 6, we know that , and then , so . And because the solution of is obviously the solution of , so and have the same solution.
Theorem 7. The -variable nonhomogeneous linear equations all have solutions, so the necessary and sufficient condition for them to have a nonzero common solution is .
4.3. Scheme Structure
We will not discuss the details of the agreement. The main thing we want to point out is that this method is equivalent to the agreement in the Lagrangian section (this equivalent is quite obvious, but it is not clearly stated in the existing literature). The only major difference is the issue of expression, that is, the Lagrangian method uses an arbitrary set of at least t participants to update their share, while the Vandermonde method uses the share of all n participants.
4.3.1. Threshold Modification
(1)Share again the first step in Figure 1. Each participant randomly selects a polynomial with the highest degree of , which satisfies , and then sends to the participant , that is, shares the initial share again with the additional share. The shared storage exchange matrix is . Each participant produces one row of the matrix and receives one column at the same time, as shown below:(2)Participants calculate the first row of a public matrix to adjust the threshold, where is a Vandermonde matrix, that is, . Suppose the vector is (3)Finally, each participant uses his share vector and is multiplied to calculate the final share:
4.3.2. Secret Reconstruction
To reconstruct the secret, participants must cooperate to construct a polynomial of degree :
The participant then calculates , or does not calculate , but directly uses the Lagrangian interpolation formula to calculate .
Consider a polynomial with the same four participants as in Section 4.2. The first step is the same as the Lagrangian method. We start directly from the second step.(1)Participants calculate the first row of a public matrix x to adjust the threshold, where x is a Vandermonde matrix:(2)Finally, each participant uses his exchange share vector and to is multiplied to calculate the final share: The secret can be reconstructed with a new threshold :
5. Conclusion
Under the conditions of the security model, this paper proposes a multisecret reputation adjustment scheme for the Internet of Vehicles, and introduces in detail the specific implementation of the dynamic adjustment of the reputation weight value when the scheme distributes multiple secret values on the Internet of Vehicles at a time. The solution can realize the situation of distributing multiple secret values at once, which proves the asynchronous and independent reconstruction of multiple secrets, and when the secret is reconstructed, the security of the shared information is guaranteed by showing the subsecret value instead of directly showing the shared information; after the reconstruction is completed, the program can dynamically adjust the reputation value according to the interaction between the participants. At the same time, it is proved that when participants conduct a collusion attack, the attacker cannot steal other unrecovered secrets value-related information, ensuring the security of the unrecovered secret. Furthermore, we provide another way to keep the secret unchanged and modify the secret threshold. The idea is to share the existing shares of the participants again, and then use the Vandermonde matrix to modify the threshold from t to t′.
Data Availability
The data that support the findings of this study are available from the corresponding author, Jingbang Wu, upon reasonable request.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work was supported in part by the Research Foundation for Youth Scholars of Beijing Technology and Business University under Grant QNJJ2020-27, and National Natural Science Foundation of China under Grants 61972225 and 61877002, and The Joint Fund Project of Beijing Natural Science Foundation and Fengtai Railway Frontier Research under Grant L191009.