Analysis and Improvement of a Conditional Privacy-Preserving Authentication Scheme With Double-Insurance in VANETs

被引:0
|
作者
Wen, Jiaming [1 ]
Bai, Lu [1 ]
Wang, Houzhen [1 ,2 ]
Liu, Jinhui [3 ,4 ]
Wang, Yahui [1 ,5 ]
Zhang, Huanguo [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430072, Peoples R China
[2] Adv Cryptog & Syst Secur Key Lab Sichuan Prov, Chengdu 610025, Peoples R China
[3] Northwestern Polytech Univ, Sch Cyber Secur, Xian 710072, Peoples R China
[4] Northwestern Polytech Univ, Res & Dev Inst, Shenzhen 518057, Peoples R China
[5] Xinyang Normal Univ, Sch Comp & Informat Technol, Xinyang 464000, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Authentication; Cryptography; Privacy; Reviews; Trusted computing; Transportation; Applied cryptography; authentication; forgery attack; message recovery signature; schnorr signature;
D O I
10.1109/TVT.2024.3426097
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As intelligent transportation develops by leaps and bounds, there has been a growing interest in leveraging Vehicular Ad-hoc Networks (VANETs) to improve efficiency and security. One key aspect of them is the Conditional Privacy-Preserving Authentication (CPPA) scheme, which addresses challenges of identity authentication and message integrity during communications. Most ID-Based CPPA schemes rely on Tamper-Proof Devices (TPDs), which are vulnerable to side-channel attacks. If sensitive data stored in TPDs are compromised, the entire system would be in danger. To tackle this issue, Xiong et al. introduced a CPPA scheme with double-insurance, claiming its security against adaptively chosen message attacks. However, this paper reveals that their scheme is universally forgeable, allowing anyone to create valid signatures on any message, rendering it inadequate for CPPA. In light of the weaknesses, we propose a novel scheme that inherits the time-tested Schnorr Signature and Abe-Okamoto Message Recovery Signature. Besides, we prove the security under the assumptions of Discrete Logarithms (DL) and Computational Diffie-Hellman (CDH), and conduct experiments and realistic evaluations. The results demonstrate its superiority, and establish its practicality in real-world scenarios.
引用
收藏
页码:17602 / 17612
页数:11
相关论文
共 50 条
  • [31] Security analysis and improvement of a privacy-preserving authentication scheme in VANET
    Yang, Xiaodong
    Wang, Wenjia
    Wang, Caifen
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (06) : 1361 - 1371
  • [32] Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs
    Xiong, Hu
    Chen, Jinhao
    Mei, Qian
    Zhao, Yanan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 2089 - 2104
  • [33] TPM-Based Conditional Privacy-Preserving Authentication Protocol in VANETs
    Zhang, Mingwu
    Zhu, Boyao
    Li, Yumei
    Wang, Yuntao
    SYMMETRY-BASEL, 2022, 14 (06):
  • [34] Security analysis and improvement of a privacy-preserving authentication scheme in VANET
    Xiaodong Yang
    Wenjia Wang
    Caifen Wang
    International Journal of Information Security, 2022, 21 : 1361 - 1371
  • [35] Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs
    Pravin Mundhe
    Vijay Kumar Yadav
    Abhishek Singh
    Shekhar Verma
    S. Venkatesan
    Wireless Personal Communications, 2020, 114 : 853 - 881
  • [36] Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs
    Mundhe, Pravin
    Yadav, Vijay Kumar
    Singh, Abhishek
    Verma, Shekhar
    Venkatesan, S.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) : 853 - 881
  • [37] WOTS-based Conditional Privacy-preserving Authentication Protocol for VANETs
    Tsai, Kuo-Yu
    Kuo, Chung-Wei
    Leung, Li-Chung
    Yang, Ying-Hsuan
    2024 8TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2024, 2024, : 5 - 9
  • [38] An Efficient Identity-Based Privacy-Preserving Authentication Scheme for VANETs
    Cui, Jie
    Xu, Wenyu
    Sha, Kewei
    Zhong, Hong
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2017, 2018, 252 : 508 - 518
  • [39] A Privacy-Preserving Aggregation Scheme With Continuous Authentication for Federated Learning in VANETs
    Feng, Xia
    Wang, Xiaofeng
    Liu, Haiyang
    Yang, Haowei
    Wang, Liangmin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (07) : 9465 - 9477
  • [40] An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs
    Su, Huadong
    Dong, Shi
    Wang, Ning
    Zhang, Ting
    VEHICULAR COMMUNICATIONS, 2024, 45