Abstract:In order to realize the security authentication of the information transmission between vehicle nodes in vehicular Ad hoc networks, a certificateless aggregate signature scheme is designed. The proposed scheme uses certificateless cryptography, which eliminates the complex maintenance cost of certificate and solves the problem of key escrow. Communicating through pseudonyms and nodes around the roadside units generated, the conditional privacy protection is achieved for vehicle users. In the random oracle model, the scheme is proved to be existentially unforgeable against adaptive chosen message attack. Then, the efficiency of the scheme is analyzed, and the relationship between the traffic density in Vehicular Ad hoc NETwork (VANETs) environment and the time delay of message verification is simulated. The results show that the scheme satisfies the message authentication, anonymity, unforgeability and traceability, as well as the higher communication efficiency and the shorter delay of message verification, which is more suitable for dynamic vehicular Ad hoc network environment.
LIU Zhe, LIU Jianwei, WU Qianhong, et al. Secure and efficient distributed pseudonym generation in VANET[J]. Journal on Communications, 2015, 36(11): 33-40. doi: 10.11959/j.issn.1000-436x.2015253.
[2]
ZHANG H. Insecurity of a certificateless aggregate signature scheme[J]. Security & Communication Networks, 2016, 9(11): 1547-1552. doi: 10.1002/sec.1447.
DU Hongzhen. An efficient and secure aggregate signature scheme for vehicular Ad hoc network[J]. Henan Science, 2016, 34(4): 481-485.
[4]
SHEN L, MA J, LIU X, et al. A provably secure aggregate signature scheme for healthcare wireless sensor networks[J]. Journal of Medical Systems, 2016, 40(11): 244-247. doi: 10.1007/s109 16-016-0613-3.
[5]
SHEN L, MA J, LIU X, et al. A secure and efficient ID-based aggregate signature scheme for wireless sensor networks[J]. IEEE Internet of Things Journal, 2017, 4(2): 546-554. doi: 10.1109/JIOT.2016.2557487.
[6]
IWASAKI T, YANAI N, INAMURA M, et al. Tightly-secure identity-based structured aggregate signature scheme under the computational Diffie-Hellman assumption[C]. IEEE International Conference on Advanced Information Networking and Applications, Australia, 2016: 669-676. doi: 10.1109/AINA.2016.99.
[7]
ZHANG L, QIN B, WU Q, et al. Efficient many-to-one authentication with certificateless aggregate signatures[J]. Computer Networks, 2010, 54(14): 2482-2491. doi: 10.1016/ j.comnet.2010.04.008.
[8]
HORNG S J, TZENG S F, HUANG P H, et al. An efficient certificateless aggregate signature with conditional privacy- preserving for vehicular sensor networks[J]. Information Sciences An International Journal, 2015, 317(C): 48-66. doi: 10.1016/j.ins.2015.04.033.
[9]
WANG H, QIN B, and DOMINGO-FERRER J. An improved binary authentication tree algorithm for vehicular networks[C]. IEEE International Conference on Intelligent Networking and Collaborative Systems, Princeton, 2012: 206-213. doi: 10.1109/iNCoS.2012.27.
[10]
HORNG S J, TZENG S F, PAN, Y, et al. b-SPECS+: Batch verification for secure pseudonymous authentication in VANET[J]. IEEE Transactions on Informaton Forensics and Security, 2013, 8(11): 1860-1875. doi: 10.1109/TIFS.2013. 2277471.
[11]
TU H, HE D, and HUANG B. Reattack of a certificateless aggregate signature scheme with constant pairing computations[J]. The Scientific World Journal, 2014(9): 1-10. doi: 10.1155/2014/343715.
[12]
SHIM K A. On the security of a certificateless aggregate signature scheme[J]. IEEE Communications Letters, 2011, 15(10): 1136-1138. doi: 10.1109/LCOMM.2011.081011. 111214.
[13]
HE D, TIAN M, and CHEN J. Insecurity of an efficient certificateless aggregate signature with constant pairing computations[J]. Information Sciences, 2014, 268: 458-462. doi: 10.1016/j.ins.2013.09.032.
ZHANG Yulei, LI Chenyi, WANG Caifen, et al. Security analysis and improvements of certificate-less aggregate signature schemes[J]. Journal of Electronics & Information Technology, 2015, 37(8): 1994-1999. doi: 10.11999/JEIT 141635.
DU Hongzhen, HUANG Meijuan, and WEN Qiaoyan. Efficient and Provably-Secure certificateless aggregate signature scheme[J]. Acta Electronica Sinica, 2013, 41(1): 72-76. doi: 10.3969/j.issn.0372-2112.2013.01.014.
[16]
SHEN H, CHEN J, SHEN J, et al. Cryptanalysis of a certificateless aggregate signature scheme with efficient verification[J]. Security & Communication Networks, 2016, 9(13): 2217-2221. doi: 10.1002/sec.1480.
[17]
WANG L, CHEN K, LONG Y, et al. Cryptanalysis of a certificateless aggregate signature scheme[J]. Security & Communication Networks, 2016, 9(11): 1353-1358. doi: 10.1002/sec.1421.
[18]
NIE H, LI Y, CHEN W, et al. NCLAS: A novel and efficient certificateless aggregate signature scheme[J]. Security & Communication Networks, 2016, 9(16): 3141-3151. doi: 10.1002/sec.1519.