ECDSA-based certificateless conditional privacy-preserving authentication scheme in Vehicular Ad Hoc Network

被引:7
|
作者
Imghoure, Abdelkrim [1 ]
El-Yahyaoui, Ahmed [1 ]
Omary, Fouzia [1 ]
机构
[1] Mohammed V Univ Rabat, Fac Sci, Rabat, Morocco
关键词
Certificateless cryptography; Trust level 3; Public key replacement attack; ECDSA; ECDSA*; Batch verification; MESSAGE AUTHENTICATION; AGGREGATE SIGNATURE; SECURITY;
D O I
10.1016/j.vehcom.2022.100504
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A Certificateless Public Key Cryptography (CL-PKC) aims to avoid the drawback of both traditional public key cryptography which requires a Public Key Infrastructure (PKI), and Identity-Based Public Key Cryptography (ID-PKC) which suffers from the inherent key escrow problem. In Vehicular Ad Hoc Network (VANET), a Certificateless Conditional Privacy Preserving Authentication (CCPPA) fulfills all known VANET security requirements in order to resolve challenges related to security and privacy. However, the existing certificateless schemes only achieve a trust level 2 according to the hierarchy defined by Girault. In case the partial private key is leaked, a malicious node can replace the public key since the public key is not bound to an identity. As a result, the trusted authority can only identify malicious nodes by using their pseudo identities. Al-Riyami and Paterson introduced a binding technique that allows to lift the trust level of a normal certificateless scheme to a trust level 3 by using a binding technique. This paper proposes new CCPPA schemes that use Al-Riyami and Paterson's technique, can achieve a stronger security and achieve a trust level 3. In case the partial private key is leaked, only the legitimate node can use the corresponding public key which has been certified by the trusted authority. As a result, the proposed CCPPA schemes address the vulnerability related to the public key replacement attack which is present in several CCPPA schemes. Our schemes also offer a tracing technique which consists of allowing the trusted authority to identify a malicious node using both its pseudo identity and public key. The proposed schemes use ECC cryptography and avoid Map-to-Hash function and bilinear pairing. Also, we called our schemes ECDSA-CCPPA and ECDSA*-CCPPA since they allow to respectively implement Elliptic Curve Digital Signature Algorithm (ECDSA) and the modified ECDSA* during authentication process in VANET. A security analysis is performed and proves that the ECDSA-CCPPA and ECDSA*-CCPPA schemes are secure in the random oracle. Actually, the ECDSA*-CCPPA scheme has an advantage over ECDSA-CCPPA in that it allows to perform a batch verification of signatures, where RSUs can support vehicles by collecting vehicle's signatures and verifying their messages in congested areas in order to reduce verification time. Additionally, a performance analysis is carried out to compare ECDSA*-CCPPA with several existing schemes. The simulation results show that ECDSA*-CCPPA outperforms the studied schemes with regard to the signature and verification process of one message. Moreover, it has the less overhead when compared to the studied certificateless schemes. (C) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] An Efficient Conditional Privacy-Preserving Authentication Scheme for the Prevention of Side-Channel Attacks in Vehicular Ad Hoc Networks
    Alshudukhi, Jalawi Sulaiman
    Mohammed, Badiea Abdulkarem
    Al-Mekhlafi, Zeyad Ghaleb
    [J]. IEEE ACCESS, 2020, 8 : 226624 - 226636
  • [32] Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks
    Wu, Libing
    Fan, Jing
    Xie, Yong
    Wang, Jing
    Liu, Qin
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (03):
  • [33] Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks
    Alazzawi, Murtadha A.
    Lu, Hongwei
    Yassin, Ali A.
    Chen, Kai
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (12) : 6121 - 6144
  • [34] Provable Security Certificateless Authentication Scheme for Vehicular Ad hoc Network
    Zeng Ping
    Guo Ruifang
    Ma Yingjie
    Gao Yuan
    Zhao Geng
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (12) : 2873 - 2881
  • [35] PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
    Zhang, Jing
    Cui, Jie
    Zhong, Hong
    Chen, Zhili
    Liu, Lu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (02) : 722 - 735
  • [36] APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    [J]. INFORMATION SECURITY, 2011, 7001 : 293 - +
  • [37] Privacy-preserving authentication schemes for vehicular ad hoc networks: a survey
    Lu, Huang
    Li, Jie
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2016, 16 (06): : 643 - 655
  • [38] Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs
    Zhou, Xiaotong
    Luo, Min
    Vijayakumar, Pandi
    Peng, Cong
    He, Debiao
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (07) : 7863 - 7875
  • [39] A weight-based conditional privacy-preserving authentication scheme in software-defined vehicular network
    Zhong, Hong
    Geng, Yingxue
    Cui, Jie
    Xu, Yan
    Liu, Lu
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [40] A weight-based conditional privacy-preserving authentication scheme in software-defined vehicular network
    Hong Zhong
    Yingxue Geng
    Jie Cui
    Yan Xu
    Lu Liu
    [J]. Journal of Cloud Computing, 9