Skip to main content
Top

2022 | OriginalPaper | Chapter

6. An ECC-Based Conditional Privacy-Preserving Authentication Scheme for Vehicle-to-Vehicle Communications

Authors : Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li

Published in: Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The certificateless cryptography (CLC) has solved the problems of certificates management in the public key infrastructure (PKI) and the inherent key escrow problem in the identity-based cryptography. Based on the CLC, many bilinear pairing-signature-based schemes have been proposed for the authentication of safety messages in VANETs. However, these schemes contain the most time-consuming operations (i.e., bilinear pairings, hash-to-point functions, and scalar multiplications in group \(G_{1}\)) in message signing and signature verification phases. In addition, the scheme [2] presented in the previous chapter also contains one bilinear pairing operation in signature verification.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference D. Jiang, V. Taliwal, A. Meier, W. Holfelder, and R. Herrtwich. Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wireless Communications, 13(5):36–43, 2006. D. Jiang, V. Taliwal, A. Meier, W. Holfelder, and R. Herrtwich. Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wireless Communications, 13(5):36–43, 2006.
2.
go back to reference I. Ali, M. Gervais, E. Ahene, and F. Li. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 99:101636, 2019. I. Ali, M. Gervais, E. Ahene, and F. Li. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 99:101636, 2019.
3.
go back to reference H. Debiao, C. Jianhua, and Z. Rui. Efficient and provably-secure certificateless signature scheme without bilinear pairings. Cryptology ePrint Archive: Report 2010/632, 2010. H. Debiao, C. Jianhua, and Z. Rui. Efficient and provably-secure certificateless signature scheme without bilinear pairings. Cryptology ePrint Archive: Report 2010/632, 2010.
4.
go back to reference D. He, J. Chen, and R. Zhang. An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems, 25(11):1432–1442, 2012.CrossRef D. He, J. Chen, and R. Zhang. An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems, 25(11):1432–1442, 2012.CrossRef
5.
go back to reference S. H. Islam, and G. Biswas. Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. International Journal of Computer Mathematics, 90(11):2244–2258, 2013.CrossRef S. H. Islam, and G. Biswas. Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. International Journal of Computer Mathematics, 90(11):2244–2258, 2013.CrossRef
6.
go back to reference N. Tiwari. On the security of pairing-free certificateless digital signature schemes using ECC. ICT Express, 1(2):94–95, 2015.MathSciNetCrossRef N. Tiwari. On the security of pairing-free certificateless digital signature schemes using ECC. ICT Express, 1(2):94–95, 2015.MathSciNetCrossRef
7.
go back to reference Y. Zhou, S. Liu, M. Xiao, S. Deng, and X. Wang. An efficient V2I authentication scheme for VANETs. Mobile Information Systems 2018, 2018. Y. Zhou, S. Liu, M. Xiao, S. Deng, and X. Wang. An efficient V2I authentication scheme for VANETs. Mobile Information Systems 2018, 2018.
8.
go back to reference J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Information Sciences, 451:1–15, 2018.MathSciNetMATH J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Information Sciences, 451:1–15, 2018.MathSciNetMATH
9.
go back to reference I. A. Kamil and S. O. Ogundoyin. An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. Journal of Information Security and Applications, 44:184–200, 2019.CrossRef I. A. Kamil and S. O. Ogundoyin. An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. Journal of Information Security and Applications, 44:184–200, 2019.CrossRef
10.
go back to reference I. Ali, T. Lawrence, and F. Li. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 103:101692, 2020. I. Ali, T. Lawrence, and F. Li. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 103:101692, 2020.
12.
go back to reference J. B. Kenney. Dedicated short-range communications (DSRC) standards in the united states. Proceedings of the IEEE, 99(7) 1162–1182, 2011.CrossRef J. B. Kenney. Dedicated short-range communications (DSRC) standards in the united states. Proceedings of the IEEE, 99(7) 1162–1182, 2011.CrossRef
13.
go back to reference K. Li, M. H. Au, W. H. Ho, and Y. L. Wang. An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online/offline certificateless aggregate signature. International Conference on Provable Security, Springer, Cham, pages 59–76, 2019. K. Li, M. H. Au, W. H. Ho, and Y. L. Wang. An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online/offline certificateless aggregate signature. International Conference on Provable Security, Springer, Cham, pages 59–76, 2019.
14.
go back to reference L. Chen, Z. Cheng, and N. P. Smart. Identity-based key agreement protocols from pairings. International Journal of Information Security, 6(4):213–241, 2007.CrossRef L. Chen, Z. Cheng, and N. P. Smart. Identity-based key agreement protocols from pairings. International Journal of Information Security, 6(4):213–241, 2007.CrossRef
15.
go back to reference V. S. Miller. Use of elliptic curves in cryptography. CRYPTO 1985: Advances in Cryptology - CRYPTO ’85 Proceedings , Springer, Berlin, Heidelberg, pages 417–426, 1985. V. S. Miller. Use of elliptic curves in cryptography. CRYPTO 1985: Advances in Cryptology - CRYPTO ’85 Proceedings , Springer, Berlin, Heidelberg, pages 417–426, 1985.
16.
go back to reference S. S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, Heidelberg, pages 452–473, 2003. S. S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, Heidelberg, pages 452–473, 2003.
17.
go back to reference I. Ali, Y. Chen, N. Ullah, R. Kumar, and W. He. An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Transactions on Vehicular Technology, 70(2):1278–1291, 2021.CrossRef I. Ali, Y. Chen, N. Ullah, R. Kumar, and W. He. An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Transactions on Vehicular Technology, 70(2):1278–1291, 2021.CrossRef
18.
go back to reference M. Raya and J.-P. Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security, 15(1):39–68, 2007.CrossRef M. Raya and J.-P. Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security, 15(1):39–68, 2007.CrossRef
19.
go back to reference D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361–396, 2000.CrossRef D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361–396, 2000.CrossRef
20.
go back to reference J.-L. Tsai. A new efficient certificateless short signature scheme using bilinear pairings. IEEE Systems Journal, 11(4):2395–2402, 2015.CrossRef J.-L. Tsai. A new efficient certificateless short signature scheme using bilinear pairings. IEEE Systems Journal, 11(4):2395–2402, 2015.CrossRef
21.
go back to reference S.-J. Horng, S.-F. Tzeng, P.-H. Huang, X. Wang, T. Li, and M. K. Khan. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences, 317:48–66, 2015.MathSciNetCrossRef S.-J. Horng, S.-F. Tzeng, P.-H. Huang, X. Wang, T. Li, and M. K. Khan. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences, 317:48–66, 2015.MathSciNetCrossRef
22.
go back to reference D. He, S. Zeadally, B. Xu, and X. Huang. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12):2681–2691, 2015.CrossRef D. He, S. Zeadally, B. Xu, and X. Huang. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12):2681–2691, 2015.CrossRef
23.
go back to reference J. Li, H. Yuan, and Y. Zhang. Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Networks, 317:48–66, 2015. J. Li, H. Yuan, and Y. Zhang. Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Networks, 317:48–66, 2015.
24.
go back to reference P. Kumar, S. Kumari, V. Sharma, X. Li, A. K. Sangaiah, and S. H. Islam. Secure CLS and CL-AS schemes designed for VANETs. The Journal of Supercomputing, 75(6):3076–3098, 2019.CrossRef P. Kumar, S. Kumari, V. Sharma, X. Li, A. K. Sangaiah, and S. H. Islam. Secure CLS and CL-AS schemes designed for VANETs. The Journal of Supercomputing, 75(6):3076–3098, 2019.CrossRef
Metadata
Title
An ECC-Based Conditional Privacy-Preserving Authentication Scheme for Vehicle-to-Vehicle Communications
Authors
Ikram Ali
Yong Chen
Mohammad Faisal
Meng Li
Copyright Year
2022
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8586-6_6