Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (2): 169-177.doi: 10.19665/j.issn1001-2400.2023.02.017

• Cyberspace Security & Others • Previous Articles     Next Articles

Certificateless aggregate signcryption scheme against forgery attacks for vehicular ad-hoc networks

PAN Senshan1,2(),WANG Saifei2()   

  1. 1. Jiangsu Key Laboratory for Industrial Network Security Technology,Jiangsu University,Zhenjiang 212013,China
    2. College of Computer and Communication Engineering,Jiangsu University,Zhenjiang 212013,China
  • Received:2022-08-15 Online:2023-04-20 Published:2023-05-12

Abstract:

Vehicular ad-hoc networks (VANETs) have received substantial attention on account of great convenience to modern transportation systems.In VANETs,the authentication of the vehicular access control and the privacy of the messages are two crucial criteria.At the same time,verification efficiency is still critical due to the limited bandwidth and high mobility characteristics of vehicles.Aggregate signcryption schemes can effectively solve the above issues.However,some of the state-of-art schemes based on the Schnorr signature are unable to resist two types of signature forgery attacks due to incorrect hash binding.In addition,two vehicles can maliciously exchange their signcryption information which can be verified successfully.A new certificateless aggregate signcryption scheme for VANETs is presented.Secret key preimage protection technology is used to prevent signature forgery attacks and hash collision resistance is utilized to resist coalition attack.The confidentiality and unforgeability of the scheme are proved under the random oracle model.Furthermore,in comparison with the state-of-art schemes,the proposed scheme which requires 6n+1 point multiplication operations during the whole authentication process enhances security without increasing computational overhead.Performance analysis shows that the scheme is suitable for VANETs.

Key words: certificateless aggregate signcryption, authentication, vehicular ad hoc networks, signature forgery attack

CLC Number: 

  • TP309