Volume 30 Issue 5
Sep.  2021
Turn off MathJax
Article Contents
DU Hongzhen, WEN Qiaoyan, ZHANG Shanshan, GAO Mingchu. A Pairing-Free Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks[J]. Chinese Journal of Electronics, 2021, 30(5): 947-955. doi: 10.1049/cje.2021.07.006
Citation: DU Hongzhen, WEN Qiaoyan, ZHANG Shanshan, GAO Mingchu. A Pairing-Free Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks[J]. Chinese Journal of Electronics, 2021, 30(5): 947-955. doi: 10.1049/cje.2021.07.006

A Pairing-Free Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks

doi: 10.1049/cje.2021.07.006
Funds:

This work is supported by the Ministry of Education of Humanities and Social Science Project (No.19YJA790007), the National Natural Science Foundation of China (No.61402015), and the Science and Technology Plan Project of Shaanxi Province (No.2020GY-041).

  • Received Date: 2020-06-01
    Available Online: 2021-09-02
  • Vehicular ad hoc networks (VANETs) create an vital platform for communication between vehicles, which can realize accident warning, auxiliary driving, road traffic information query, passenger communication and other applications. While providing convenient services for people, VANETs also bring some security risks. Security and privacy are the primary issues in the research of VANETs. Signcryption is an ideal way to transfer messages in a logical step in a secure and authenticated way. We design a Certificateless signcryption (CLSC) scheme to provide confidentiality, authentication, integrity, non-repudiation and user privacy preservation for the information transmitted between vehicle communication units. We demonstrate the confidentiality and unforgeability of the proposed scheme in the random oracle model. Moreover, compared with the existing CLSC schemes, ours realizes the perfect combination of efficiency, security and privacy, and it is particularly well adapted to the secure communication of vehicle networks.
  • loading
  • J. Hubaux, S. Capkun and J. Luo, "The security and privacy of smart vehicles", IEEE Security Privacy, Vol.2, No.3, pp.49-55, 2004.
    M. Raya and J. Hubaux, "Securing vehicular ad hoc networks", Journal of Computer Security, Vol.15, No.1, pp.39-68, 2007.
    J. Isaac, S. Zeadally and J. Camara, "Security attacks and solutions for vehicular ad hoc networks", IET Communications, Vol.4, No.7, pp.894-903, 2010.
    R. Lu, X. Lin, H. Zhu, et al., "ECPP:Efficient conditional privacy preservation protocol for secure vehicular communications", 27th IEEE Conference on Computer Communications, Phoenix, AZ, USA, pp.1229-1237, 2008.
    J. Zhang, M. Xu and L. Liu, "On the security of a secure batch verification with group testing for VANET", International Journal of Network Security, Vol.16, No.5, pp.351-358, 2014.
    C. Zhang, R. Lu, X. Lin, et al., "An efficient identity-based batch verification scheme for vehicular sensor networks", 27th IEEE Conference on Computer Communications, Phoenix, AZ, USA, pp.246-250, 2008.
    T. Chim, S. Yiu, L. Hui, et al., "Specs:secure and privacy enhancing communications schemes for VANETs", Ad Hoc Networks, Vol.9, No.2, pp.189-203, 2011.
    K. Shim, "Cpas:An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks", IEEE Transaction Vehicular Technology, Vol.61, No.4, pp.1874-1883, 2012.
    S. Horng, S. Tzeng, Y. Pan, et al., "B-specs+:Batch verification for secure pseudonymous authentication in VANET", IEEE Transactions on Information Forensics and Security, Vol.8, No.11, pp.1860-1875, 2013.
    M. Bayat, M. Barmshoory, M. Rahimi, et al., "A secure authentication scheme for VANETs with batch verification", Wireless Networks, Vol.21, No.5, pp.1733-1743, 2015.
    D. He, S. Zeadally, B. Xu, et al., "An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks", IEEE Transactions on Information Forensics and Security, Vol.10, No.12, pp.2681-2691, 2015.
    Y. Zheng, "Digital signcryption or how to achieve cost (signature and encryption) cost (signature) + cost (encryption)", Proc. of Crypto1997, California, USA, pp.165-179, 1997.
    S. Al-Riyami and K. G. Paterson, "Certificateless public key cryptography", Proc. of Asiacrypt2003, Taipei, Taiwan, LNCS 2894, Berlin, Springer-Verlag, pp.452-473, 2003.
    M. Barbosa and P. Farshim, "Certificateless signcryption", Proc. of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, pp.369-372, 2008.
    C. Wu and Z. Chen, "A new efficient certificateless signcryption scheme", Proc. of the International Symposium on Information Science and Engieering (ISISE' 08), Piscataway, NJ, USA, pp.661-664, 2008.
    W. Xie, Z. Zhang, "Efficient and provably secure certificateless signcryption from bilinear maps", IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), Beijing, China, pp.558-562, 2010.
    G. Yu, H. Yang, S. Fan, et al., "Efficient certificateless signcryption scheme", Proc. of the Third International Symposium on Electronic Commerce and Security Workshops (ISECS'10), Guangzhou, China, pp.55-59, 2010.
    P. Li, M. He, X. Li, et al., "Efficient and provably secure certificateless signcryption from bilinear pairings", Journal of Computational Information Systems, Vol.11, No.6, pp.3643-3650, 2010.
    S. Islam and F. Li, "Leakage-free and provably secure certificateless signcryption scheme using bilinear pairings", The Computer Journal, Vol.58, No.10, pp.2636-2648, 2015.
    F. Li, M. Shirase and T. Takagi, "Certificateless hybrid signcryption", Mathematical and Computer Modeling, Vol.57, No.3-4, pp.324-343, 2013.
    F. Li, Y. Han and C. Jin, "Cost-effective and anonymous access control for wireless body area networks", IEEE Systems Journal, Vol.12, No.1, pp.747-758, 2018.
    A. Yin and H. Liang, "On security of a certificateless hybrid signcryption scheme", Wireless Personal Communications, Vol.85, No.4, pp.1727-1739, 2015.
    A. Yin and H. Liang, "Certificateless hybrid signcryption scheme for secure communication of wireless sensor networks", Wireless Personal Communications, Vol.80, pp.1049-1062, 2015.
    C. Zhou, W. Zhou and X. Dong, "Provable certificateless generalized signcryption scheme", Designs Codes and Cryptography, Vol.71, pp.331-346, 2014.
    L. Cao and W. Ge, "Analysis of certificateless signcryption schemes and construction of a secure and efficient pairingfree one based on ECC", KSII Transactions on Internet and Information Systems, Vol.12, No.9, pp.4527-4547, 2018.
    A. Waheed, J. Iqbal, N. Din, et al., "Improved cryptanalysis of provable certificateless generalized signcryption", International Journal of Advanced Computer Science and Applications, Vol.10, No.4, pp.610-616, 2019.
    C. Zhou, "Certificateless signcryption scheme without random oracles", Chinese Journal of Electronics, Vol.27, No.5, pp.1002-1008, 2018.
    V. Balasubramanian and T. Mala, "Improved certificateless signcryption for IoT smart devices", Applied Mathematics and Information Sciences, Vol.13, No.1, pp.31-38, 2019.
    A. Arfaoui, O. R. M. Boudia, A. Kribeche, S. -M. Senouci, et al. "Context-aware access control and anonymous authentication in WBAN", Computers & Security, Vol.88, pp.1-16, 2020.
    H. Zhu, H. Li and Y. Wang, "Certificateless signcryption scheme without pairing", Journal of Computer Research and Development, Vol.47, pp.1587-1594, 2010.
    W. Liu and C. Xu, "Certificateless signcryption scheme without bilinear pairing", Journal of Software, Vol.22, No.8, pp.1918-1926, 2011. (in Chinese)
    S. Selvi, S. Vivek and C. Rangan, "Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing", International conference on information security and cryptology, Seoul, Korea, pp.75-92, 2010.
    W. Shi, N. Kumar, P. Gong and Z. Zhang, "Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing", Frontiers of Computer Science, Vol.8, No.4, pp.656-666, 2014.
    H. Yu and B Yang, "Pairing-free and secure certificateless signcryption scheme", The Computer Journal, Vol.60, No.8, pp.1187-1196, 2017.
    S. Mandal, B. Bera, A. K. Sutrala, et al., "Certificateless signcryption-based three-factor user access control scheme for IoT environment", IEEE Internet of Things Journal, Vol.7, No.4, pp.3184-3197.
    Y. Huang, J. Zhang and H. Chen, "On the security of a certificateless signcryption scheme", Proc. of IWECA2014, Ottawa, Canada, pp.664-667, 2014.
    D. He, "Security analysis of a certificateless signcryption scheme", Journal of Software, Vol.24, No.3, pp.618-622, 2013(in Chinese)
    X. Lin, L. Sun, H. Qu and D. Liu, "Cryptanalysis of a pairingfree certificateless signcryption scheme", The Computer Journal, Vol.61, No.4, pp.539-544, 2018.
    B. Zhang, Z. Jia and C. Zhao, "An efficient certificateless generalized signcryption scheme", Security and Communication Networks, Vol.2018, pp.1-11, 2018.
    A. Zhang, L. Wang, X. Ye, et al., "Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems", IEEE Transactions on Information Forensics and Security, Vol.12, No.3, pp.662-675, 2017.
    C. Zhou, "An improved lightweight certificateless generalized signcryption scheme for mobile-health system", International Journal of Distributed Sensor Networks, Vol.15, No.1, pp.1-16, 2019.
    D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures", Journal of Cryptology, Vol.13, No.3, pp.361-396, 2000.
    H. Du, Q. Wen, S. Zhang, et al., "A new provably-secure certificateless signature scheme for Internet of Things", Ad Hoc Networks, Vol.100, pp.1-10, 2020.
    J. Xie, Y. Hu, J. Gao and M. Jiang, "Certificateless sequential aggregate signature scheme on NTRU lattice", Chinese Journal of Electronics, Vol.28, No.2, pp.294-300,2019.
    The Certicom Corporation. "SEC 2:Recommended elliptic curve domain parameters", The Standard for Efficient Cryptography Group, 2000, http://www.secg.org/SEC2-Ver-1.0.pdf,2000-08-17.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (163) PDF downloads(15) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return