Journal of Computer Applications ›› 2025, Vol. 45 ›› Issue (5): 1556-1563.DOI: 10.11772/j.issn.1001-9081.2024050695
• Cyber security • Previous Articles
Yueduan XU1,2, Jianwei CHEN1,2(
), Hengliang ZHU3
Received:2024-05-27
Revised:2024-08-11
Accepted:2024-08-20
Online:2024-09-04
Published:2025-05-10
Contact:
Jianwei CHEN
About author:XU Yueduan, born in 1999, M. S. candidate. His research interests include vehicular Ad hoc network, information security, privacy protection.Supported by:通讯作者:
陈建伟
作者简介:徐越端(1999—),男,福建莆田人,硕士研究生,主要研究方向:车联网、信息安全、隐私保护基金资助:CLC Number:
Yueduan XU, Jianwei CHEN, Hengliang ZHU. Conditional privacy-preserving authentication scheme based on certificateless group signature for VANET[J]. Journal of Computer Applications, 2025, 45(5): 1556-1563.
徐越端, 陈建伟, 朱恒亮. 基于无证书群签名的车联网条件隐私保护认证方案[J]. 《计算机应用》唯一官方网站, 2025, 45(5): 1556-1563.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2024050695
| 方案 | 匿名性 | 不可 链接性 | 不可 伪造性 | 可追踪性 | 前向 安全性 | 高效 撤销性 |
|---|---|---|---|---|---|---|
| 文献[ | √ | √ | × | √ | √ | √ |
| 文献[ | √ | √ | √ | √ | √ | × |
| 文献[ | √ | √ | × | √ | × | × |
| 文献[ | √ | √ | √ | √ | √ | × |
| 文献[ | √ | √ | × | √ | √ | √ |
| 文献[ | √ | √ | √ | √ | × | × |
| 本文方案 | √ | √ | √ | √ | √ | √ |
Tab. 1 Security comparison of different schemes
| 方案 | 匿名性 | 不可 链接性 | 不可 伪造性 | 可追踪性 | 前向 安全性 | 高效 撤销性 |
|---|---|---|---|---|---|---|
| 文献[ | √ | √ | × | √ | √ | √ |
| 文献[ | √ | √ | √ | √ | √ | × |
| 文献[ | √ | √ | × | √ | × | × |
| 文献[ | √ | √ | √ | √ | √ | × |
| 文献[ | √ | √ | × | √ | √ | √ |
| 文献[ | √ | √ | √ | √ | × | × |
| 本文方案 | √ | √ | √ | √ | √ | √ |
| 符号 | 含义 | 执行时间/ms |
|---|---|---|
| 椭圆曲线上的乘法 | 0.354 2 | |
| 双线性运算 | 5.734 2 | |
| 标量乘法 | 0.863 0 | |
| 通用散列函数操作 | 0.001 4 | |
| 模乘 | 0.011 3 | |
| 模幂 | 0.614 1 |
Tab. 2 Execution time of related operations
| 符号 | 含义 | 执行时间/ms |
|---|---|---|
| 椭圆曲线上的乘法 | 0.354 2 | |
| 双线性运算 | 5.734 2 | |
| 标量乘法 | 0.863 0 | |
| 通用散列函数操作 | 0.001 4 | |
| 模乘 | 0.011 3 | |
| 模幂 | 0.614 1 |
| 方案 | 计算开销/ms | |
|---|---|---|
| 签名生成阶段 | 签名验证阶段 | |
| 文献[ | ||
| 文献[ | ||
| 文献[ | ||
| 本文方案 | ||
Tab. 3 Comparison of computational overhead of single message
| 方案 | 计算开销/ms | |
|---|---|---|
| 签名生成阶段 | 签名验证阶段 | |
| 文献[ | ||
| 文献[ | ||
| 文献[ | ||
| 本文方案 | ||
| 方案 | 通信开销 (消息签名大小+公钥长度+时间戳+ID长度)/B |
|---|---|
| 文献[ | 512+256+4+4=776 |
| 文献[ | 256+64+2+2=280 |
| 文献[ | 120+32+4+4=160 |
| 本文方案 | 71+32+2+2=107 |
Tab. 4 Communication overhead comparison of different schemes
| 方案 | 通信开销 (消息签名大小+公钥长度+时间戳+ID长度)/B |
|---|---|
| 文献[ | 512+256+4+4=776 |
| 文献[ | 256+64+2+2=280 |
| 文献[ | 120+32+4+4=160 |
| 本文方案 | 71+32+2+2=107 |
| 1 | WANG Y, LIU Y, TIAN Y. ISC-CPPA: improved security certificateless conditional privacy preserving authentication scheme with revocation[J]. IEEE Transactions on Vehicular Technology, 2022, 71(11): 12304-12314. |
| 2 | XIE Q, DING Z, ZHENG P. Provably secure and anonymous V2I and V2V authentication protocol for VANETs[J]. IEEE Transactions on Intelligent Transportation Systems,2023,24(7): 7318-7327. |
| 3 | SUCASAS V, ALY A, MANTAS G, et al. Secure multiparty computation-based privacy-preserving authentication for smart cities[J]. IEEE Transactions on Cloud Computing,2023,11(4): 3555-3572. |
| 4 | WIERZYNSKI, AMANDA J. The vulnerabilities of autonomous vehicles[M]. Utica, NY: Utica College, 2019: 42. |
| 5 | ASGHAR M, DOSS R R M, PAN L. A scalable and efficient PKI based authentication protocol for VANETs[C]// Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference. Piscataway: IEEE, 2018: 1-3. |
| 6 | SUN Y, LU R, LIN X, et al. An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications[J]. IEEE Transactions on Vehicular Technology, 2010,59(7): 3589-3603. |
| 7 | TIAN J, WAMG Y, SHEN Y. An identity-based authentication scheme with full anonymity and unlinkability for mobile edge computing[J]. IEEE Internet of Things Journal, 2024, 11(3): 23561-23576. |
| 8 | LU R, LIN X, ZHU H, et al. ECPP: efficient conditional privacy preservation protocol for secure vehicular communications[C]// Proceedings of the 27th IEEE Conference on Computer Communications. Piscataway: IEEE, 2008: 1229-1237. |
| 9 | TZENG S F, HORNG S J, LI T, et al. Enhancing security and privacy for identity-based batch verification scheme in VANETs[J]. IEEE Transactions on Vehicular Technology, 2017, 66(4): 3235-3248. |
| 10 | HU X, WANG J, XU H, et al. Secure and pairing-free identity-based batch verification scheme in vehicle ad-hoc networks[C]// Proceedings of the 2016 International Conference on Intelligent Computing, LNCS 9773. Cham: Springer, 2016: 11-20. |
| 11 | ZHANG C, HO P H, TAPOLCAI J. On batch verification with group testing for vehicular communications[J]. Wireless Networks, 2011, 17(8): 1851-1865. |
| 12 | AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]// Proceedings of the 2003 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Berlin: Springer, 2003: 452-473. |
| 13 | REZAEIBAGHA F, MU Y, HUANG X, et al. Fully secure lightweight certificateless signature scheme for IIoT[J]. IEEE Access, 2019, 7: 144433-144443. |
| 14 | XU Z, HE D, KUMAR N, et al. Efficient certificateless aggregate signature scheme for performing secure routing in VANETs[J]. Security and Communication Networks, 2020, 2020: No.5276813. |
| 15 | ALII, CHEN Y, ULLAH N, et al. An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs[J]. IEEE Transactions on Vehicular Technology, 2021, 70(2): 1278-1291. |
| 16 | ZHOU X, LUO M, VIJAYKUMAR P, et al. Efficient certificateless conditional privacy-preserving authentication for VANETs[J]. IEEE Transactions on Vehicular Technology, 2022, 71(7): 7863-7875. |
| 17 | CHAUM D, VAN HEYST E. Group signatures[C]// Proceedings of the 1991 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 547. Berlin: Springer, 1991: 257-265. |
| 18 | CAO Y, XU S, CHEN X, et al. A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios[J]. Computer Networks, 2022, 214: No.109149. |
| 19 | SONI M, SINGH D K. Blockchain-based group authentication scheme for 6G communication network[J]. Physical Communication, 2023, 57: No.102005. |
| 20 | GU K, YANG L, WANG Y, et al. Traceable identity-based group signature [J]. RAIRO — Theoretical Informatics and Applications, 2016, 50(3): 193-226. |
| 21 | ZHU X, JIANG S, WANG L, et al. Privacy-preserving authentication based on group signature for VANETs[C]// Proceedings of the 2013 IEEE Global Communications Conference. Piscataway: IEEE, 2013: 4609-4614. |
| 22 | 张兴兰.一种高效的群签名方案[J].计算机应用研究,2009,26(11):4276-4278. |
| ZHANG X L. Efficient group signature scheme[J]. Application Research of Computers, 2009, 26(11): 4276-4278. | |
| 23 | ZHANG G, WANG S. A certificateless signature and group signature schemes against malicious PKG[C]// Proceedings of the 22nd International Conference on Advanced Information Networking and Applications. Piscataway: IEEE, 2008: 334-341. |
| 24 | WEI L, LIU J, ZHU T. On a group signature scheme supporting batch verification for vehicular networks[C]// Proceedings of the 3rd International Conference on Multimedia Information Networking and Security. Piscataway: IEEE, 2011: 436-440. |
| 25 | ZHOU Y, CAO L, QIAO Z, et al. An efficient identity authentication scheme with dynamic anonymity for VANETs[J]. IEEE Internet of Things Journal, 2023,10(11): 10052-10065. |
| 26 | HU X, TAN W, MA C. Certificateless Aggregate signature schemes for privacy protection of security analysis and improvement[C]// Proceedings of the 2020 International Conference on Computer Science and Management Technology. Piscataway: IEEE, 2020: 314-317. |
| 27 | ZHANG J, CUI J, ZHONG H, et al. PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(2): 722-735. |
| 28 | POINTCHEVAL D, STERN J. Security proofs for signature schemes[C]// Proceedings of the 1996 Annual International Conference on Theory and Applications of Cryptographic Techniques, LNCS 1070. Berlin: Springer, 1996: 387-398. |
| [1] | Haifeng MA, Jiewei CAI, Qingshui XUE, Jiahai YANG, Jing HAN, Zixuan LU. Post-quantum certificateless public audit scheme based on lattice [J]. Journal of Computer Applications, 2025, 45(4): 1249-1255. |
| [2] | Jianyang CUI, Ying CAI, Yu ZHANG, Yanfang FAN. Authenticatable privacy-preserving scheme based on signcryption from lattice for vehicular ad hoc network [J]. Journal of Computer Applications, 2024, 44(1): 233-241. |
| [3] | Juangui NING, Guofang DONG. Blockchain-based vehicle-to-infrastructure fast handover authentication scheme in VANET [J]. Journal of Computer Applications, 2024, 44(1): 252-260. |
| [4] | Xiuping ZHU, Yali LIU, Changlu LIN, Tao LI, Yongquan DONG. Efficient certificateless ring signature scheme based on elliptic curve [J]. Journal of Computer Applications, 2023, 43(11): 3368-3374. |
| [5] | NONG Qiang, ZHANG Bangbang, OUYANG Yuhao. Lattice-based hierarchical certificateless proxy signature scheme [J]. Journal of Computer Applications, 2023, 43(1): 154-159. |
| [6] | ZHAO Hong, YU Shuhan, HAN Yanyan, LI Zhaobin. Analysis and improvement of certificateless signature scheme [J]. Journal of Computer Applications, 2023, 43(1): 147-153. |
| [7] | Yangnan GUO, Wenbao JIANG, Shuai YE. Supervisable blockchain anonymous transaction system model [J]. Journal of Computer Applications, 2022, 42(9): 2757-2764. |
| [8] | Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN. Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation [J]. Journal of Computer Applications, 2022, 42(7): 2094-2103. |
| [9] | Jingwen WU, Xinchun YIN, Jianting NING. Traceable and revocable multi-authority attribute-based encryption scheme for vehicular ad hoc networks [J]. Journal of Computer Applications, 2022, 42(6): 1695-1701. |
| [10] | Jingwen WU, Xinchun YIN, Jianting NING. Revocable aggregate signature authentication scheme for vehicular ad hoc networks [J]. Journal of Computer Applications, 2022, 42(3): 911-920. |
| [11] | Dong ZHU, Xinchun YIN, Jianting NING. Certificateless signature scheme with strong privacy protection for internet of vehicles [J]. Journal of Computer Applications, 2022, 42(10): 3091-3101. |
| [12] | Ping ZHANG, Yiqiao JIA, Jiechang WANG, Nianfeng SHI. Three-factor anonymous authentication and key agreement protocol [J]. Journal of Computer Applications, 2021, 41(11): 3281-3287. |
| [13] | CHEN Weiwei, CAO Li, SHAO Changhong. Blockchain based efficient anonymous authentication scheme for IOV [J]. Journal of Computer Applications, 2020, 40(10): 2992-2999. |
| [14] | CHEN Hong, LIU Yumeng, XIAO Chenglong, GUO Pengfei, XIAO Zhenjiu. Improved RC4 algorithm based on elliptic curve [J]. Journal of Computer Applications, 2019, 39(8): 2339-2345. |
| [15] | LIU Xindong, XU Shuishuai, CHEN Jianhua. Authentication scheme for smart grid communication based on elliptic curve cryptography [J]. Journal of Computer Applications, 2019, 39(3): 779-783. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||