Skip to main content
Erschienen in: Wireless Personal Communications 2/2020

12.11.2019

Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs

verfasst von: Jiguo Li, Yichen Zhang

Erschienen in: Wireless Personal Communications | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vehicular ad hoc networks (VANETs) has been paid more and more attention by the researchers and industry. Recently, Bayat et al. proposed a secure authentication scheme of VANETs with batch verification. Based on the computational Diffie–Hellman (CDH) assumption, they claimed that their scheme was secure. Unfortunately, we find that the scheme presented by Bayat et al. is insecure in their security model. It cannot resist the adversary attack so that a malicious vehicle can forge arbitrarily legal vehicle’s signature on any message. We give a concrete attack process. Furthermore, we provide a batch verification certificateless signature scheme for VANETs. Based on the CDH assumption, we prove that the presented scheme is secure against adaptively chosen message attack in the random oracle model. The performance analysis shows that our scheme is more suitable for realistic applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, F. Y., Zeng, D., & Yang, L. (2006). Smart cars on smart roads: An IEEE intelligent transportation systems society update. IEEE Pervasive Computing,5(4), 68–69.CrossRef Wang, F. Y., Zeng, D., & Yang, L. (2006). Smart cars on smart roads: An IEEE intelligent transportation systems society update. IEEE Pervasive Computing,5(4), 68–69.CrossRef
2.
Zurück zum Zitat Lee, U., Zhou, B., Gerla, M., & Magistretti, E. (2006). Mobeyes: Smart mobs for urban monitoring with a vehicular sensor network. IEEE Wireless Communications,13(5), 52–57.CrossRef Lee, U., Zhou, B., Gerla, M., & Magistretti, E. (2006). Mobeyes: Smart mobs for urban monitoring with a vehicular sensor network. IEEE Wireless Communications,13(5), 52–57.CrossRef
3.
Zurück zum Zitat Misener, J. A. (2005). Vehicle-infrastructure integration (VII) and satety: Rubber and radio meets the road in california. Intellimotion,11(2), 1–3.MathSciNet Misener, J. A. (2005). Vehicle-infrastructure integration (VII) and satety: Rubber and radio meets the road in california. Intellimotion,11(2), 1–3.MathSciNet
4.
Zurück zum Zitat Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2006). Securing mobile ad hoc networks with certificateless public keys. IEEE Transactions on Dependable and Secure Computing,3(4), 386–399.CrossRef Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2006). Securing mobile ad hoc networks with certificateless public keys. IEEE Transactions on Dependable and Secure Computing,3(4), 386–399.CrossRef
5.
Zurück zum Zitat Zhang, C., Lu, R., Lin, X., Ho, P.-H., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In: The 27th IEEE communications society conference on computer communications (INFOCOM 2008) (pp. 816–824). Zhang, C., Lu, R., Lin, X., Ho, P.-H., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In: The 27th IEEE communications society conference on computer communications (INFOCOM 2008) (pp. 816–824).
6.
Zurück zum Zitat Huang, J.-L., Yeh, L.-Y., & Chien, H.-Y. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology,60(1), 248–262.CrossRef Huang, J.-L., Yeh, L.-Y., & Chien, H.-Y. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology,60(1), 248–262.CrossRef
7.
Zurück zum Zitat Chim, T. W., Yiu, S.-M., Hui, L. C., & Li, V. O. (2011). SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks,9(2), 189–203.CrossRef Chim, T. W., Yiu, S.-M., Hui, L. C., & Li, V. O. (2011). SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks,9(2), 189–203.CrossRef
8.
Zurück zum Zitat Wang, H., & Zhang, Y. (2012). On the security of an anonymous batch authenticated and key agreement scheme for value-added services in VANETs. Procedia Engineering,29, 1735–1739.CrossRef Wang, H., & Zhang, Y. (2012). On the security of an anonymous batch authenticated and key agreement scheme for value-added services in VANETs. Procedia Engineering,29, 1735–1739.CrossRef
9.
Zurück zum Zitat Zhang, C., Ho, P.-H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks,17(8), 1851–1865.CrossRef Zhang, C., Ho, P.-H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks,17(8), 1851–1865.CrossRef
10.
Zurück zum Zitat Lee, C. C., & Lai, Y. M. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks,19(6), 1441–1449.CrossRef Lee, C. C., & Lai, Y. M. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks,19(6), 1441–1449.CrossRef
11.
Zurück zum Zitat Zhang, J., Xu, M., & Liu, L. (2014). On the security of a secure batch verification with group testing for VANET. International Journal of Network Security,16(5), 355–362. Zhang, J., Xu, M., & Liu, L. (2014). On the security of a secure batch verification with group testing for VANET. International Journal of Network Security,16(5), 355–362.
12.
Zurück zum Zitat Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks,21(5), 1733–1743.CrossRef Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks,21(5), 1733–1743.CrossRef
13.
Zurück zum Zitat Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT 2003 (pp. 452–473). Berlin: Springer. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT 2003 (pp. 452–473). Berlin: Springer.
14.
Zurück zum Zitat Shamir, A. (1984). A identity-based cryptosystems and signature schemes. In Advances in cryptology-Crypto’84 (pp. 47–53). Berlin: Springer. Shamir, A. (1984). A identity-based cryptosystems and signature schemes. In Advances in cryptology-Crypto’84 (pp. 47–53). Berlin: Springer.
15.
Zurück zum Zitat Tso, R., Yi, X., & Huang, X. (2011). Efficient and short certificateless signatures secure against realistic adversaries. The Journal of Supercomputing,55(2), 173–191.CrossRef Tso, R., Yi, X., & Huang, X. (2011). Efficient and short certificateless signatures secure against realistic adversaries. The Journal of Supercomputing,55(2), 173–191.CrossRef
16.
Zurück zum Zitat Choi, K. Y., Park, J. H., & Lee, D. H. (2011). A new provably secure certificateless short signature scheme. Computers & Mathematics with Applications,61(7), 1760–1768.MathSciNetCrossRef Choi, K. Y., Park, J. H., & Lee, D. H. (2011). A new provably secure certificateless short signature scheme. Computers & Mathematics with Applications,61(7), 1760–1768.MathSciNetCrossRef
17.
Zurück zum Zitat He, D., Chen, J., & Zhang, R. (2012). An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems,25(11), 1432–1442.CrossRef He, D., Chen, J., & Zhang, R. (2012). An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems,25(11), 1432–1442.CrossRef
18.
Zurück zum Zitat Li, Jiguo, Zhao, Jingjing, & Zhang, Yichen. (2015). Certificateless online/offline signcryption scheme. Security and Communication Networks,8(11), 1979–1990.CrossRef Li, Jiguo, Zhao, Jingjing, & Zhang, Yichen. (2015). Certificateless online/offline signcryption scheme. Security and Communication Networks,8(11), 1979–1990.CrossRef
19.
Zurück zum Zitat He, D., Chen, Y., & Chen, J. (2013). An efficient certificateless proxy signature scheme without pairing. Mathematical and Computer Modelling,57(9–10), 2510–2518.MathSciNetCrossRef He, D., Chen, Y., & Chen, J. (2013). An efficient certificateless proxy signature scheme without pairing. Mathematical and Computer Modelling,57(9–10), 2510–2518.MathSciNetCrossRef
20.
Zurück zum Zitat Yang, Lu, & Li, Jiguo. (2016). Provably secure certificateless proxy signature scheme in the standard model. Theoretical Computer Science,639, 42–59.MathSciNetCrossRef Yang, Lu, & Li, Jiguo. (2016). Provably secure certificateless proxy signature scheme in the standard model. Theoretical Computer Science,639, 42–59.MathSciNetCrossRef
21.
Zurück zum Zitat Yu, Y. T., Mu, Y., Wang, G., Xia, Q., & Yang, B. (2012). Improved certificateless signature scheme provably secure in the standard model. IET Information Security,6(2), 102–110.CrossRef Yu, Y. T., Mu, Y., Wang, G., Xia, Q., & Yang, B. (2012). Improved certificateless signature scheme provably secure in the standard model. IET Information Security,6(2), 102–110.CrossRef
22.
Zurück zum Zitat Li, J., Huang, X., Mu, Y., & Wu, W. (2008). Cryptanalysis and improvement of an efficient certificateless signature scheme. Journal of Communications and Networks,10(10), 10–17.CrossRef Li, J., Huang, X., Mu, Y., & Wu, W. (2008). Cryptanalysis and improvement of an efficient certificateless signature scheme. Journal of Communications and Networks,10(10), 10–17.CrossRef
23.
Zurück zum Zitat He, D., Chen, J., & Hu, J. (2012). A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems,25(2), 221–230.CrossRef He, D., Chen, J., & Hu, J. (2012). A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems,25(2), 221–230.CrossRef
24.
Zurück zum Zitat He, D., Huang, B., & Chen, J. (2013). New certificateless short signature scheme. IET Information Security,7(2), 113–117.CrossRef He, D., Huang, B., & Chen, J. (2013). New certificateless short signature scheme. IET Information Security,7(2), 113–117.CrossRef
25.
Zurück zum Zitat Li, Jiguo, Li, Yanqiong, & Zhang, Yichen. (2013). Provably secure forward secure certificateless proxy signature scheme. KSII Transactions on Internet and Information Systems,7(8), 1972–1988.CrossRef Li, Jiguo, Li, Yanqiong, & Zhang, Yichen. (2013). Provably secure forward secure certificateless proxy signature scheme. KSII Transactions on Internet and Information Systems,7(8), 1972–1988.CrossRef
26.
Zurück zum Zitat Li, J., Li, Y., & Zhang, Y. (2013). Forward secure certificateless proxy signature scheme. In J. Lopez, X. Huang, & R. Sandhu (Eds.), NSS 2013, LNCS (Vol. 7873, pp. 350–364). Li, J., Li, Y., & Zhang, Y. (2013). Forward secure certificateless proxy signature scheme. In J. Lopez, X. Huang, & R. Sandhu (Eds.), NSS 2013, LNCS (Vol. 7873, pp. 350–364).
27.
Zurück zum Zitat Yang, Lu, Quanling, Zhang, & Jiguo, Li. (2015). An improved certificateless strong key-insulated signature scheme in the standard model. Advances in Mathematics of Communications,9(3), 353–373.MathSciNetCrossRef Yang, Lu, Quanling, Zhang, & Jiguo, Li. (2015). An improved certificateless strong key-insulated signature scheme in the standard model. Advances in Mathematics of Communications,9(3), 353–373.MathSciNetCrossRef
28.
Zurück zum Zitat Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Advances in cryptology—CRYPTO 2001 (pp. 213–229). Berlin; Springer. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Advances in cryptologyCRYPTO 2001 (pp. 213–229). Berlin; Springer.
29.
Zurück zum Zitat Pointcheval, D., & Stern, J. (1996). Security proofs for signature schemes. In Advances in cryptology—EUROCRYPT’96 (pp. 387–398). Berlin; Springer. Pointcheval, D., & Stern, J. (1996). Security proofs for signature schemes. In Advances in cryptologyEUROCRYPT’96 (pp. 387–398). Berlin; Springer.
30.
Zurück zum Zitat Shim, K.-A. (2012). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology,61(4), 1874–1883.CrossRef Shim, K.-A. (2012). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology,61(4), 1874–1883.CrossRef
Metadaten
Titel
Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs
verfasst von
Jiguo Li
Yichen Zhang
Publikationsdatum
12.11.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06912-y

Weitere Artikel der Ausgabe 2/2020

Wireless Personal Communications 2/2020 Zur Ausgabe

Neuer Inhalt