Journal of Computer Applications ›› 2023, Vol. 43 ›› Issue (11): 3358-3367.DOI: 10.11772/j.issn.1001-9081.2022111757
• National Open Distributed and Parallel Computing Conference 2022 (DPCS 2022) • Previous Articles Next Articles
					
						                                                                                                                                                                                    Guishuang XU1,2, Xinchun YIN1,2,3( )
)
												  
						
						
						
					
				
Received:2022-11-04
															
							
																	Revised:2023-02-01
															
							
																	Accepted:2023-02-10
															
							
							
																	Online:2023-02-28
															
							
																	Published:2023-11-10
															
							
						Contact:
								Xinchun YIN   
													About author:XU Guishuang, born in 1999, M. S. candidate. Her research interests include certificateless signature, communication security of vehicular ad-hoc network.Supported by:通讯作者:
					殷新春
							作者简介:徐贵双(1999—),女,云南昭通人,硕士研究生,主要研究方向:无证书签名、车载自组网通信安全基金资助:CLC Number:
Guishuang XU, Xinchun YIN. Certificateless conditional privacy-preserving authentication scheme for VANET[J]. Journal of Computer Applications, 2023, 43(11): 3358-3367.
徐贵双, 殷新春. 车载自组网无证书条件隐私保护认证方案[J]. 《计算机应用》唯一官方网站, 2023, 43(11): 3358-3367.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2022111757
| 符号 | 含义 | 
|---|---|
| q | 一个大素数 | 
| G | 阶为 | 
| P | 群 | 
| params | 系统公共参数 | 
| KGC的公钥 | |
| s | KGC的私钥 | 
| TA的公钥 | |
| a | TA的私钥 | 
| 车辆 | |
| 车辆 | |
| 车辆 | |
| 待签名的消息 | |
| 单个/聚合签名 | 
Tab. 1 Notations description of proposed scheme
| 符号 | 含义 | 
|---|---|
| q | 一个大素数 | 
| G | 阶为 | 
| P | 群 | 
| params | 系统公共参数 | 
| KGC的公钥 | |
| s | KGC的私钥 | 
| TA的公钥 | |
| a | TA的私钥 | 
| 车辆 | |
| 车辆 | |
| 车辆 | |
| 待签名的消息 | |
| 单个/聚合签名 | 
| 方案来源 | 认证性 | 不可否认性 | 匿名性 | 条件可追踪性 | 不可链接性 | 抗攻击性 | |||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| 重放 | 冒充 | 篡改 | 中间人 | ||||||||
| 文献[ | √ | √ | √ | √ | × | × | √ | √ | √ | √ | √ | 
| 文献[ | × | √ | √ | √ | √ | √ | × | × | × | √ | √ | 
| 文献[ | √ | √ | √ | √ | √ | √ | × | √ | √ | √ | √ | 
| 文献[ | √ | √ | √ | √ | √ | × | × | √ | √ | √ | √ | 
| 本文 | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | 
Tab. 2 Comparison of security
| 方案来源 | 认证性 | 不可否认性 | 匿名性 | 条件可追踪性 | 不可链接性 | 抗攻击性 | |||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| 重放 | 冒充 | 篡改 | 中间人 | ||||||||
| 文献[ | √ | √ | √ | √ | × | × | √ | √ | √ | √ | √ | 
| 文献[ | × | √ | √ | √ | √ | √ | × | × | × | √ | √ | 
| 文献[ | √ | √ | √ | √ | √ | √ | × | √ | √ | √ | √ | 
| 文献[ | √ | √ | √ | √ | √ | × | × | √ | √ | √ | √ | 
| 本文 | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | 
| 符号 | 含义 | 时间/ms | 
|---|---|---|
| Tbp | 一次双线性配对运算 | 4.211 0 | 
| Tbp_m | 一次基于配对的标量乘运算 | 1.739 0 | 
| Tbp_a | 一次基于配对的点加运算 | 0.007 1 | 
| Tecc_m | 一次椭圆曲线上的标量乘运算 | 0.442 0 | 
| Tecc_a | 一次椭圆曲线上的点加运算 | 0.001 8 | 
| Tmtp | 一次映射到点的哈希运算 | 4.406 0 | 
Tab. 3 Execution time of cryptographic operations
| 符号 | 含义 | 时间/ms | 
|---|---|---|
| Tbp | 一次双线性配对运算 | 4.211 0 | 
| Tbp_m | 一次基于配对的标量乘运算 | 1.739 0 | 
| Tbp_a | 一次基于配对的点加运算 | 0.007 1 | 
| Tecc_m | 一次椭圆曲线上的标量乘运算 | 0.442 0 | 
| Tecc_a | 一次椭圆曲线上的点加运算 | 0.001 8 | 
| Tmtp | 一次映射到点的哈希运算 | 4.406 0 | 
| 方案来源 | 签名 | 单个签名验证 | 聚合签名验证 | 
|---|---|---|---|
| 文献[ | Tecc_m=0.442 0 | 3Tecc_m+2Tecc_a=1.331 6 | (2n+1)Tecc_m+2nTecc_a=0.887 6n+0.442 0 | 
| 文献[ | 2Tbp_m+Tbp_a=3.485 1 | 3Tbp+Tbp_m+Tbp_a+Tmtp=18.785 1 | 3Tbp+Tbp_m+nTbp_a+nTmtp=4.413 1n+14.372 | 
| 文献[ | 3Tbp_m+Tbp_a=5.224 1 | 3Tbp+Tbp_m+Tbp_a+Tmtp=18.785 1 | 3Tbp+Tbp_m+nTbp_a+nTmtp=4.413 1n+14.372 | 
| 文献[ | 3Tecc_m+2Tecc_a=1.329 6 | 4Tecc_m+3Tecc_a=1.773 4 | (3n+1)Tecc_m+3nTecc_a=1.331 4n+0.442 | 
| 本文 | Tecc_m=0.442 0 | 4Tecc_m+3Tecc_a=1.773 4 | (3n+1)Tecc_m+3nTecc_a=1.331 4n +0.442 | 
Tab. 4 Comparison of computational cost
| 方案来源 | 签名 | 单个签名验证 | 聚合签名验证 | 
|---|---|---|---|
| 文献[ | Tecc_m=0.442 0 | 3Tecc_m+2Tecc_a=1.331 6 | (2n+1)Tecc_m+2nTecc_a=0.887 6n+0.442 0 | 
| 文献[ | 2Tbp_m+Tbp_a=3.485 1 | 3Tbp+Tbp_m+Tbp_a+Tmtp=18.785 1 | 3Tbp+Tbp_m+nTbp_a+nTmtp=4.413 1n+14.372 | 
| 文献[ | 3Tbp_m+Tbp_a=5.224 1 | 3Tbp+Tbp_m+Tbp_a+Tmtp=18.785 1 | 3Tbp+Tbp_m+nTbp_a+nTmtp=4.413 1n+14.372 | 
| 文献[ | 3Tecc_m+2Tecc_a=1.329 6 | 4Tecc_m+3Tecc_a=1.773 4 | (3n+1)Tecc_m+3nTecc_a=1.331 4n+0.442 | 
| 本文 | Tecc_m=0.442 0 | 4Tecc_m+3Tecc_a=1.773 4 | (3n+1)Tecc_m+3nTecc_a=1.331 4n +0.442 | 
| 方案来源 | 单个签名 | |
|---|---|---|
| 文献[ | (3n+1) | |
| 文献[ | (3n+1) | |
| 文献[ | (2n+1) | |
| 文献[ | (3n+1) | |
| 本文 | 4n | 
Tab. 5 Comparison of communication cost
| 方案来源 | 单个签名 | |
|---|---|---|
| 文献[ | (3n+1) | |
| 文献[ | (3n+1) | |
| 文献[ | (2n+1) | |
| 文献[ | (3n+1) | |
| 本文 | 4n | 
| 1 | ASUQUO P, CRUICKSHANK H, MORLEY J, et al. Security and privacy in location-based services for vehicular and mobile communications: an overview, challenges, and countermeasures[J]. IEEE Internet of Things Journal, 2018, 5(6): 4778-4802. 10.1109/jiot.2018.2820039 | 
| 2 | MOHAMED HATIM S, ELIAS S J, AWANG N, et al. VANETs and Internet of Things (IoT): a discussion[J]. Indonesian Journal of Electrical Engineering and Computer Science, 2018, 12(1): 218-224. 10.11591/ijeecs.v12.i1.pp218-224 | 
| 3 | AZEES M, VIJAYAKUMAR P, JEGATHA DEBORAH L. Comprehensive survey on security services in vehicular ad-hoc networks[J]. IET Intelligent Transport Systems, 2016, 10(6): 379-388. 10.1049/iet-its.2015.0072 | 
| 4 | PALANISWAMY B, CAMTEPE S, FOO E, et al. An efficient authentication scheme for intra-vehicular controller area network[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 3107-3122. 10.1109/tifs.2020.2983285 | 
| 5 | SENGUPTA J, RUJ S, DAS BIT S. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT[J]. Journal of Network and Computer Applications, 2020, 149: No.102481. 10.1016/j.jnca.2019.102481 | 
| 6 | CHEN C M, HUANG Y, WANG K H, et al. A secure authenticated and key exchange scheme for fog computing[J]. Enterprise Information Systems, 2021, 15(9): 1200-1215. 10.1080/17517575.2020.1712746 | 
| 7 | CHEN Y, CHEN J. CPP-CLAS: efficient and conditional privacy-preserving certificateless aggregate signature scheme for VANETs[J]. IEEE Internet of Things Journal, 2022, 9(12): 10354-10365. 10.1109/jiot.2021.3121552 | 
| 8 | HORNG S J, TZENG S F, HUANG P H, et al. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks[J]. Information Sciences, 2015, 317: 48-66. 10.1016/j.ins.2015.04.033 | 
| 9 | ZHONG H, HAN S, CUI J, et al. Privacy-preserving authentication scheme with full aggregation in VANET[J]. Information Sciences, 2019, 476: 211-221. 10.1016/j.ins.2018.10.021 | 
| 10 | KAMIL I A, OGUNDOYIN S O. An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks[J]. Journal of Information Security and Applications, 2019, 44: 184-200. 10.1016/j.jisa.2018.12.004 | 
| 11 | RAYA M, HUBAUX J P. Securing vehicular ad hoc networks[J]. Journal of Computer Security, 2007, 15(1): 39-68. 10.3233/jcs-2007-15103 | 
| 12 | LU R, LIN X, ZHU H, et al. ECPP: efficient conditional privacy preservation protocol for secure vehicular communications[C]// Proceedings of the 27th Conference on Computer Communications. Piscataway: IEEE, 2008: 1229-1237. 10.1109/infocom.2008.179 | 
| 13 | AZEES M, VIJAYAKUMAR P, JEGATHA DEBORAH L. EAAP: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2017, 18(9): 2467-2476. 10.1109/tits.2016.2634623 | 
| 14 | VIJAYAKUMAR P, CHANG V, JEGATHA DEBORAH L, et al. Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks[J]. Future Generation Computer Systems, 2018, 78: 943-955. 10.1016/j.future.2016.11.024 | 
| 15 | GU T, YUAN B, LIU Y, et al. An improved EAAP scheme for vehicular ad hoc networks[J]. International Journal of Communication Systems, 2020, 33(6): No.e4183. 10.1002/dac.4283 | 
| 16 | LIN X, SUN X, HO P H, et al. GSIS: a secure and privacy-preserving protocol for vehicular communications[J]. IEEE Transactions on Vehicular Technology, 2007, 56(6): 3442-3456. 10.1109/tvt.2007.906878 | 
| 17 | ZHU X, JIANG S, WANG L, et al. Efficient privacy-preserving authentication for vehicular ad hoc networks[J]. IEEE Transactions on Vehicular Technology, 2014, 63(2): 907-919. 10.1109/tvt.2013.2294032 | 
| 18 | WANG Y, ZHONG H, XU Y, et al. ECPB: efficient conditional privacy-preserving authentication scheme supporting batch verification for VANETs[J]. International Journal of Network Security, 2016, 18(2): 374-382. | 
| 19 | WANG P, CHEN C M, KUMARI S, et al. HDMA: hybrid D2D message authentication scheme for 5G-enabled VANETs[J]. IEEE Transactions on Intelligent Transportation Systems, 2021, 22(8): 5071-5080. 10.1109/tits.2020.3013928 | 
| 20 | SHAO J, LIN X, LU R, et al. A threshold anonymous authentication protocol for VANETs[J]. IEEE Transactions on Vehicular Technology, 2016, 65(3): 1711-1720. 10.1109/tvt.2015.2405853 | 
| 21 | HE D, ZEADALLY S, XU B, et al. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(12): 2681-2691. 10.1109/tifs.2015.2473820 | 
| 22 | TZENG S F, HORNG S J, LI T, et al. Enhancing security and privacy for identity-based batch verification scheme in VANETs[J]. IEEE Transactions on Vehicular Technology, 2017, 66(4): 3235-3248. 10.1109/tvt.2015.2406877 | 
| 23 | YANG W, CHEN M R, ZENG G Q. Cryptanalysis of two strongly unforgeable identity-based signatures in the standard model[J]. International Journal of Network Security, 2018, 20(6): 1194-1199. | 
| 24 | ALI I, LAWRENCE T, LI F. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs[J]. Journal of Systems Architecture, 2020, 103: No.101692. 10.1016/j.sysarc.2019.101692 | 
| 25 | LI J, YUAN H, ZHANG Y. Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks[EB/OL]. (2016-07-13) [2022-07-12].. 10.1016/j.ins.2015.04.033 | 
| 26 | CUI J, ZHANG J, ZHONG H, et al. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks[J]. Information Sciences, 2018, 451/452: 1-15. 10.1016/j.ins.2018.03.060 | 
| 27 | ZHAO Y, HOU Y, WANG L, et al. An efficient certificateless aggregate signature scheme for the internet of vehicles[J]. Transactions on Emerging Telecommunications Technologies, 2020, 31(5): No.e3708. 10.1002/ett.3708 | 
| 28 | KAMIL I A, OGUNDOYIN S O. On the security of privacy-preserving authentication scheme with full aggregation in vehicular ad hoc network[J]. Security and Privacy, 2020, 3(3): No.e104. 10.1002/spy2.104 | 
| 29 | MEI Q, XIONG H, CHEN J, et al. Efficient certificateless aggregate signature with conditional privacy preservation in IoV[J]. IEEE Systems Journal, 2021, 15(1): 245-256. 10.1109/jsyst.2020.2966526 | 
| 30 | KUMAR P, KUMARI S, SHARMA V, et al. Secure CLS and CL-AS schemes designed for VANETs[J]. The Journal of Supercomputing, 2019, 75(6): 3076-3098. 10.1007/s11227-018-2312-y | 
| 31 | LI C, WU G, XING L, et al. An efficient certificateless aggregate signature scheme designed for VANET[J]. Computers, Materials, and Continua, 2020, 63(2): 725-742. | 
| 32 | ALI I, CHEN Y, ULLAH N, et al. An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs[J]. IEEE Transactions on Vehicular Technology, 2021, 70(2): 1278-1291. 10.1109/tvt.2021.3050399 | 
| 33 | ZHOU X, LUO M, VIJAYAKUMAR P, et al. Efficient certificateless conditional privacy-preserving authentication for VANETs[J]. IEEE Transactions on Vehicular Technology, 2022, 71(7): 7863-7875. 10.1109/tvt.2022.3169948 | 
| 34 | 扬州大学. 一种适用于车载自组网安全通信和条件隐私保护认证的方法:CN115379418B[P]. 2023-05-09. | 
| Yangzhou University. A method for secure communication and conditional privacy protection authentication in vehicular ad-hoc networks:CN115379418B [P]. 2023-05-09. | |
| 35 | 张振超,刘亚丽,殷新春,等. 无证书签名方案的分析及改进[J]. 密码学报, 2020, 7(3): 389-403. 10.13868/j.cnki.jcr.000375 | 
| ZHANG Z C, LIU Y L, YIN X C, et al. Analysis and improvement of certificateless signature schemes[J]. Journal of Cryptologic Research, 2020, 7(3): 389-403. 10.13868/j.cnki.jcr.000375 | |
| 36 | DIFFIE W, HELLMAN M. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654. 10.1109/tit.1976.1055638 | 
| 37 | POINTCHEVAL D, STERN J. Security proofs for signature schemes[C]// Proceedings of the 1996 International Conference on the Theory and Applications of Cryptographic Technique, LNCS 1070. Berlin: Springer, 1996: 387-398. | 
| 38 | BELLARE M, GARAY J A, RABIN T. Fast batch verification for modular exponentiation and digital signatures[C]// Proceedings of the 1998 International Conference on the Theory and Applications of Cryptographic Technique, LNCS 1403. Berlin: Springer, 1998: 236-250. | 
| 39 | MING Y, SHEN X. PCPA: a practical certificateless conditional privacy preserving authentication scheme for vehicular ad hoc networks[J]. Sensors, 2018, 18(5): No.1573. 10.3390/s18051573 | 
| 40 | Shamus Software Ltd. MIRACL library[EB/OL]. [2022-07-12].. 10.1177/1084822317725733 | 
| [1] | ZHAO Hong, YU Shuhan, HAN Yanyan, LI Zhaobin. Analysis and improvement of certificateless signature scheme [J]. Journal of Computer Applications, 2023, 43(1): 147-153. | 
| [2] | TANG Xingfeng, XU Qingqin, MA Shiwei. Vehicular ad-hoc network greedy routing algorithm based on path exploration [J]. Journal of Computer Applications, 2020, 40(6): 1738-1744. | 
| [3] | LIU Yudong, WANG Xu'an, TU Guangsheng, WANG Han. Cloud outsourcing data secure auditing protocol throughout whole lifecycle [J]. Journal of Computer Applications, 2019, 39(7): 1954-1958. | 
| [4] | LI Zhaobin, LIU Zeyi, WEI Zhanzhen, HAN Yu. Software defined network path security based on Hash chain [J]. Journal of Computer Applications, 2019, 39(5): 1368-1373. | 
| [5] | ZUO Yuxing, GUO Aihuang, HUANG Bo, WANG Lu. Power control algorithm based on network utility maximization in Internet of vehicles [J]. Journal of Computer Applications, 2017, 37(12): 3345-3350. | 
| [6] | WANG Jie, LU Jianzhu, ZENG Xiaofei. Data aggregation scheme for wireless sensor network to timely determine compromised nodes [J]. Journal of Computer Applications, 2016, 36(9): 2432-2437. | 
| [7] | XU Zhexin, LI Shijie, LIN Xiao, WU Yi. Power control mechanism for vehicle status message in VANET [J]. Journal of Computer Applications, 2016, 36(8): 2175-2180. | 
| [8] | XU Qian, TAN Chengxiang. Anonymous privacy-preserving scheme for cloud storage based on CP_ABE [J]. Journal of Computer Applications, 2015, 35(6): 1573-1579. | 
| [9] | LI Shaokun. Provable secure certificateless fully homomorphic encryption scheme in standard model [J]. Journal of Computer Applications, 2015, 35(2): 387-392. | 
| [10] | LAN Jinjia, HAN Yiliang, YANG Xiaoyuan. Signcryption scheme based on multivariate cryptosystem [J]. Journal of Computer Applications, 2015, 35(2): 401-406. | 
| [11] | WANG Daxing, TENG Jikai. Provably secure identity-based aggregate signcryption scheme [J]. Journal of Computer Applications, 2015, 35(2): 412-415. | 
| [12] | ZHU Xinpei KOU Yingzhan WANG Zhanyu. network coding; data transmission; digital watermarking; stack shuffle; Message Authentication Code (MAC) [J]. Journal of Computer Applications, 2014, 34(8): 2350-2355. | 
| [13] | WANG Zhanjun LI Jie MA Haiying WANG Jinhua. Fully secure identity-based online/offline encryption [J]. Journal of Computer Applications, 2014, 34(12): 3458-3461. | 
| [14] | SUN Hua MENG Kun. Efficient provably secure certificateless signcryption scheme in standard model [J]. Journal of Computer Applications, 2013, 33(07): 1846-1850. | 
| [15] | LI Haifeng LAN Caihui ZUO Weiping MA Haiyun. New two-party key agreement protocol in separate networks [J]. Journal of Computer Applications, 2013, 33(05): 1353-1356. | 
| Viewed | ||||||
| Full text |  | |||||
| Abstract |  | |||||