ECDSA-based certificateless conditional privacy-preserving authentication scheme in Vehicular Ad Hoc Network

被引:7
|
作者
Imghoure, Abdelkrim [1 ]
El-Yahyaoui, Ahmed [1 ]
Omary, Fouzia [1 ]
机构
[1] Mohammed V Univ Rabat, Fac Sci, Rabat, Morocco
关键词
Certificateless cryptography; Trust level 3; Public key replacement attack; ECDSA; ECDSA*; Batch verification; MESSAGE AUTHENTICATION; AGGREGATE SIGNATURE; SECURITY;
D O I
10.1016/j.vehcom.2022.100504
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A Certificateless Public Key Cryptography (CL-PKC) aims to avoid the drawback of both traditional public key cryptography which requires a Public Key Infrastructure (PKI), and Identity-Based Public Key Cryptography (ID-PKC) which suffers from the inherent key escrow problem. In Vehicular Ad Hoc Network (VANET), a Certificateless Conditional Privacy Preserving Authentication (CCPPA) fulfills all known VANET security requirements in order to resolve challenges related to security and privacy. However, the existing certificateless schemes only achieve a trust level 2 according to the hierarchy defined by Girault. In case the partial private key is leaked, a malicious node can replace the public key since the public key is not bound to an identity. As a result, the trusted authority can only identify malicious nodes by using their pseudo identities. Al-Riyami and Paterson introduced a binding technique that allows to lift the trust level of a normal certificateless scheme to a trust level 3 by using a binding technique. This paper proposes new CCPPA schemes that use Al-Riyami and Paterson's technique, can achieve a stronger security and achieve a trust level 3. In case the partial private key is leaked, only the legitimate node can use the corresponding public key which has been certified by the trusted authority. As a result, the proposed CCPPA schemes address the vulnerability related to the public key replacement attack which is present in several CCPPA schemes. Our schemes also offer a tracing technique which consists of allowing the trusted authority to identify a malicious node using both its pseudo identity and public key. The proposed schemes use ECC cryptography and avoid Map-to-Hash function and bilinear pairing. Also, we called our schemes ECDSA-CCPPA and ECDSA*-CCPPA since they allow to respectively implement Elliptic Curve Digital Signature Algorithm (ECDSA) and the modified ECDSA* during authentication process in VANET. A security analysis is performed and proves that the ECDSA-CCPPA and ECDSA*-CCPPA schemes are secure in the random oracle. Actually, the ECDSA*-CCPPA scheme has an advantage over ECDSA-CCPPA in that it allows to perform a batch verification of signatures, where RSUs can support vehicles by collecting vehicle's signatures and verifying their messages in congested areas in order to reduce verification time. Additionally, a performance analysis is carried out to compare ECDSA*-CCPPA with several existing schemes. The simulation results show that ECDSA*-CCPPA outperforms the studied schemes with regard to the signature and verification process of one message. Moreover, it has the less overhead when compared to the studied certificateless schemes. (C) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    Zhu, Fei
    Yi, Xun
    Abuadbba, Alsharif
    Khalil, Ibrahim
    Huang, Xinyi
    Xu, Feihong
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (10) : 10456 - 10466
  • [2] PCPA: A Practical Certificateless Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    Ming, Yang
    Shen, Xiaoqin
    [J]. SENSORS, 2018, 18 (05)
  • [3] Blockchain-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
    Gong C.
    Xiong L.
    He X.
    Niu X.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (5) : 6273 - 6286
  • [4] A Realistic Distributed Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    Liu, Zhi-Cai
    Xiong, Ling
    Peng, Tu
    Peng, Dai-Yuan
    Liang, Hong-Bin
    [J]. IEEE ACCESS, 2018, 6 : 26307 - 26317
  • [5] Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network
    Li, Quanrun
    He, Debiao
    Yang, Zhichao
    Xie, Qi
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (04) : 4336 - 4347
  • [6] An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network
    Al-shareeda, Mahmood A.
    Anbar, Mohammed
    Manickam, Selvakumar
    Hasbullah, Iznan H.
    [J]. SYMMETRY-BASEL, 2020, 12 (10): : 1 - 25
  • [7] Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    Al-Shareeda, Mahmood A.
    Anbar, Mohammed
    Manickam, Selvakumar
    Hasbullah, Iznan Husainy
    [J]. IEEE ACCESS, 2021, 9 : 113226 - 113238
  • [8] An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature
    Li, Kang
    Au, Man Ho
    Ho, Wang Hei
    Wang, Yi Lei
    [J]. PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 59 - 76
  • [9] An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    He, Debiao
    Zeadally, Sherali
    Xu, Baowen
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2681 - 2691
  • [10] EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
    Azees, Maria
    Vijayakumar, Pandi
    Deboarh, Lazarus Jegatha
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) : 2467 - 2476