An efficient signcryption scheme for secure communication of VANET

被引:0
作者
Zhang, Yu [1 ,2 ]
Chen, Jing [1 ]
Du, Rui-Ying [1 ]
Zhou, Qing [2 ]
Zheng, Ming-Hui [3 ]
机构
[1] School of Computer, Wuhan University, Wuhan, 430072, Hubei
[2] Science and Technology on Information Assurance Laboratory, Beijing
[3] Hubei Institute for Nationalities, Enshi, 445000, Hubei
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2015年 / 43卷 / 03期
关键词
Bilinear pairing; Identity-based signcryption; Provable security; Vehicular ad hoc networks;
D O I
10.3969/j.issn.0372-2112.2015.03.015
中图分类号
学科分类号
摘要
According to the characteristics of vehicular networks, this paper presents a identity-based signcryption scheme using the bilinear pairings and proves its security in the random oracle model. The proposed scheme is proved to be secure assuming that the Bilinear Diffie-Hellman problem is hard. Compared with the existing identity based signcryption schemes, the new scheme has lower computation cost and communication overhead. It is suitable for secure communication of vehicular networks. ©, 2015, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:512 / 517
页数:5
相关论文
共 30 条
[1]  
Martinez F.J., Toh C.-K., Cano J.-C., Et al., Emergency services in future intelligent transportation systems based on vehicular communication networks, Intelligent Transportation Systems Magazine, IEEE, 2, 2, pp. 6-20, (2010)
[2]  
Papadimitratos P., La Fortelle A., Evenssen K., Et al., Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportation, Communications Magazine, IEEE, 47, 11, pp. 84-95, (2009)
[3]  
Papadimitratos P., Buttyan L., Holczer T., Et al., Secure vehicular communication systems: design and architecture, Communications Magazine, IEEE, 46, 11, pp. 100-109, (2008)
[4]  
Wu L., Liu M., Wang X.-M., Et al., Mobile distribution-aware data dissemination for vehicular ad hoc networks, Journal of Software, 22, 7, pp. 1580-1596, (2011)
[5]  
Mishra B., Nayak P., Behera S., Et al., Security in vehicular adhoc networks: a survey, Proceedings of the 2011 International Conference on Communication, Computing & Security, pp. 590-595, (2011)
[6]  
Tian R., Sun L., Liu Y., Et al., COBRA: A collaboration based reinforcement mechanism for mass transmission in VANETs, Journal of Computer Research and Development, 46, 12, pp. 2076-2084, (2009)
[7]  
Zheng Y., Digital signcryption or how to achieve cost (signature & encryption<< cost (signature)+ cost (encryption), Advances in Cryptology-CRYPTO'97, pp. 165-179, (1997)
[8]  
Shamir A., Identity-based cryptosystems and signature schemes, Advances in Cryptology, pp. 47-53, (1985)
[9]  
Malone-Lee J., Identity-based Signcryption, (2002)
[10]  
Zhang L., Wu Q., Solanas A., Et al., A scalable robust authentication protocol for secure vehicular communications, Vehicular Technology, IEEE Transactions on, 59, 4, pp. 1606-1617, (2010)