A traceable and verifiable CP-ABE scheme with blockchain in VANET

被引:1
作者
Huang, Haijun [1 ]
Zhang, Hong [1 ]
Zhao, Zidi [1 ]
Zhang, Shouhua [2 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Qiyi East Rd, Baoding 071000, Hebei, Peoples R China
[2] Univ Oulu, Informat Technol & Elect Engn, Oulu, Finland
关键词
VANET (Vehicular ad hoc network); CP-ABE; Traceability; ECDSA; Tamper-proof; ATTRIBUTE-BASED ACCESS; SECURE; ENCRYPTION; SYSTEM;
D O I
10.1007/s11227-023-05322-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Vehicular ad hoc networks (VANETs), secure communication in VANETs has been extensively studied. However, it is very challenging for VANETs to establish reliable data sharing for one-to-many users without access control. Attribute-based encryption (ABE) is a promising access control technique, which can maintain data confidentiality and is suitable for applications in VANETs. The current ABE scheme performs encryption and decryption of elements on the bilinear group, which is unfriendly for large-scale plaintexts and causes VANETs vulnerable to receive malicious or erroneous information. In this paper, we propose a variant attribute-based encryption access control scheme to achieve fine-grained access control for VANETs data shared in cloud and fog. It allows a message sender to determine which vehicles receive and decrypt messages based on the vehicle's attributes. We also employ a fusion of AES and CP-ABE to address the issue of key leakage caused by symmetric encryption key transferring. We implement a one-time key operation to make each ciphertext with its unique key and signature, which greatly improves the security of data transmission and provides tamper-proof for the plaintext. We also offer a novel method that treats roadside units as the constituent parts of a blockchain and publishes the device's public signature on the chain to validate the sender's identity. Compared with other existing CP-ABE schemes, our scheme is easily retrofitted to other encryption frameworks. Finally, performance evaluation reveals the security and efficiency of the proposed scheme based on theoretical analysis and experimental analysis.
引用
收藏
页码:16859 / 16883
页数:25
相关论文
共 39 条
[1]  
Abidi A, 2014, 2014 GLOBAL SUMMIT ON COMPUTER & INFORMATION TECHNOLOGY (GSCIT)
[2]  
Abram D, 2022, P IEEE S SECUR PRIV, P2554, DOI [10.1109/SP46214.2022.9833559, 10.1109/SP46214.2022.00128]
[3]  
Alabbasi A., 2020, IEEE T SERV COMPUT, V15, P118
[4]  
Aloqaily M, 2014, 2014 11TH ANNUAL HIGH CAPACITY OPTICAL NETWORKS AND EMERGING/ENABLING TECHNOLOGIES (PHOTONICS FOR ENERGY), P94, DOI 10.1109/HONET.2014.7029369
[5]  
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[6]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[7]  
Boneh D, 2003, 2003 23 ANN INT CRYP
[8]   UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts [J].
Canetti, Ran ;
Gennaro, Rosario ;
Goldfeder, Steven ;
Makriyannis, Nikolaos ;
Peled, Udi .
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, :1769-1787
[9]   A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios [J].
Cao, Yibo ;
Xu, Shiyuan ;
Chen, Xue ;
He, Yunhua ;
Jiang, Shuo .
COMPUTER NETWORKS, 2022, 214
[10]  
De Caro A, 2011, IEEE SYMP COMP COMMU