Quantum-resistant Lattice-based Authentication for V2X Communication in C-ITS

被引:5
作者
Ha, Sewan [1 ]
Lee, Hakjun [1 ]
Won, Dongho [2 ]
Lee, Youngsook [3 ]
机构
[1] Sungkyunkwan Univ, Dept Elect & Comp Engn, Suwon, South Korea
[2] Sungkyunkwan Univ, Coll Software, Suwon, South Korea
[3] Howon Univ, Dept Cyber Secur, Gunsan, South Korea
来源
PROCEEDINGS OF THE 2020 14TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM) | 2020年
基金
新加坡国家研究基金会;
关键词
quantum-resistant authentication; lattice-based authentication; vehicular communications; vehicle-to-everything;
D O I
10.1109/imcom48794.2020.9001682
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although there has been a lot of research on a vehicle to everything (V2X) for a cooperative-intelligent transport system (C-ITS), there has been little research on quantum-resistant V2X schemes. Since the speed of improvement in quantum computing is groundbreaking, we need to develop a quantum-resistant scheme in advance. In this paper, we propose a quantum-resistant lattice-based scheme for C-ITS, making safe even in the quantum era. Our proposed scheme uses a simplified NTRU Prime and BLISS that are considered to support both security and practicality. In addition, the scheme is a pseudonym-based authentication scheme as other V2X authentication schemes because pseudonym-based authentication provides both security and anonymity. Lastly, our proposed scheme is robust against several known attacks such as impersonation, replay, and quantum attacks.
引用
收藏
页数:8
相关论文
共 23 条
[1]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]  
[Anonymous], 2010, PRECIOSA PRIVACY ENA
[3]  
[Anonymous], 2017, SCMS SECURITY CREDEN
[4]  
Barreto P. S. L. M., 2018, IACR CRYPTOL EPRINT, P1247
[5]   NTRU Prime: Reducing Attack Surface at Low Cost [J].
Bernstein, Daniel J. ;
Chuengsatiansup, Chitchanok ;
Lange, Tanja ;
van Vredendaal, Christine .
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017, 2018, 10719 :235-260
[6]  
Bissmeyer N, 2013, 2013 10TH ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES (WONS), P9, DOI 10.1109/WONS.2013.6578314
[7]   A Security Credential Management System for V2X Communications [J].
Brecht, Benedikt ;
Therriault, Dean ;
Weimerskirch, Andre ;
Whyte, William ;
Kumar, Virendra ;
Hehn, Thorsten ;
Goudy, Roy .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2018, 19 (12) :3850-3871
[8]  
Calandriello G, 2007, VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, P19
[9]  
Chen L, 2016, REPORT POSTQUANTUM C
[10]  
Ducas L, 2013, LECT NOTES COMPUT SC, V8042, P40, DOI 10.1007/978-3-642-40041-4_3