An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs

被引:75
|
作者
Cui, Jie [1 ,2 ,3 ]
Wu, Di [1 ,2 ,3 ]
Zhang, Jing [1 ,2 ,3 ]
Xu, Yan [1 ,2 ,3 ]
Zhong, Hong [1 ,2 ,3 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230039, Anhui, Peoples R China
[2] Anhui Univ, Inst Phys Sci & Informat Technol, Hefei 230039, Anhui, Peoples R China
[3] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless signature; self-healing key distribution; semitrusted authority; VANETs; PRIVACY-PRESERVING AUTHENTICATION; CERTIFICATELESS AGGREGATE SIGNATURE; HEALING KEY DISTRIBUTION; MESSAGE AUTHENTICATION; SECURE; PROTOCOL;
D O I
10.1109/TVT.2019.2896018
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the development of intelligent transportation systems, vehicular ad hoc networks (VANETs) are widely used in safety driving, and so on. However, existing signature schemes, such as pseudonym-and group-based schemes, have certain problems, such as the need for a certificate distribution and certificate revocation lists (CRLs). With such schemes, the vehicle needs to store a valid certificate generated by the management center. Simultaneously, the receiver needs to check the CRLs prior to message authentication. CRLs require large amounts of storage space and computational and communication resources. In addition, many such schemes are built on a trusted authority and do not meet real-world needs. Thus, we propose an efficient authentication scheme based on semitrusted authority in VANETs. In this scheme, we combine the self-healing key distribution method with a certificateless signature in a semitrusted authority environment, such that the receivers do not require to query the CRLs. Therefore, the vehicles do not have to store the CRLs, thereby saving storage space and communication resources. This also reduces the computational costs and improves the efficiency of the message authentication. Since the proposed scheme is built on a semitrusted authority, it is a more realistic approach.
引用
收藏
页码:2972 / 2986
页数:15
相关论文
共 50 条
  • [1] An Improved Identity-Based Anonymous Authentication Scheme Resistant to Semi-Trusted Server Attacks
    Xie, Dong
    Yang, Jinghua
    Bian, Weixin
    Chen, Fulong
    Wang, Taochun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01): : 734 - 746
  • [2] Hierarchical Access Control Scheme Based on the Semi-Trusted Center
    Zhang Min-Qing
    Liu Yun-Hao
    Yang Xiao-Yuan
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 162 - 165
  • [3] Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator
    Xiangjun Xin
    Li Ding
    Qinglan Yang
    Chaoyang Li
    Tianyuan Zhang
    Yongxuan Sang
    [J]. Quantum Information Processing, 21
  • [4] Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator
    Xin, Xiangjun
    Ding, Li
    Yang, Qinglan
    Li, Chaoyang
    Zhang, Tianyuan
    Sang, Yongxuan
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (07)
  • [5] Proxy signature scheme with a semi-trusted third party
    Liu Peiyu
    Cui Tao
    Xu Mingying
    [J]. CEIS 2011, 2011, 15
  • [6] Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing
    Awaneesh Kumar Yadav
    An Braeken
    Manoj Misra
    [J]. The Journal of Supercomputing, 2023, 79 : 11261 - 11299
  • [7] Semi-quantum blind double signature scheme with semi-trusted arbitrator
    Zhang, Ling
    Zhang, Jia-Hao
    Xin, Xiang-Jun
    Li, Chao-Yang
    [J]. MODERN PHYSICS LETTERS B, 2024, 38 (24):
  • [8] Multiparty authentication services and key agreement protocols with semi-trusted third party
    Dong Zheng
    Kefei Chen
    Jinyuan You
    [J]. Journal of Computer Science and Technology, 2002, 17 : 749 - 756
  • [9] Multiparty authentication services and key agreement protocols with semi-trusted third party
    Zheng, D
    Chen, KF
    You, JY
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2002, 17 (06): : 749 - 756
  • [10] NERA: A new and efficient RSU based authentication scheme for VANETs
    Bayat, Majid
    Pournaghi, Morteza
    Rahimi, Majid
    Barmshoory, Mostafa
    [J]. WIRELESS NETWORKS, 2020, 26 (05) : 3083 - 3098