4.6 Article

PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2019.2904274

Keywords

Authentication; Servers; Protocols; Privacy; Cathode ray tubes; Ad hoc networks; Vehicular Ad-hoc networks (VANETs); chinese remainder theorem (CRT); authentication; conditional privacy-preserving; elliptic curve

Funding

  1. National Natural Science Foundation of China [61872001, 61572001, 61702005]
  2. Open Fund of Key Laboratory of Embedded System and Service Computing (Tongji University), Ministry of Education [ESSCKF2018-03]
  3. Open Fund for Discipline Construction, Institute of Physical Science and Information Technology, Anhui University
  4. Excellent Talent Project of Anhui University

Ask authors/readers for more resources

The proposed conditional privacy-preserving authentication scheme based on Chinese remainder theorem aims to address the challenge of fast authentication in Vehicular Ad-hoc Networks. By using realistic TPDs, the scheme enhances the security of the entire system.
Existing security and identity-based vehicular communication protocols used in Vehicular Ad-hoc Networks (VANETs) to achieve conditional privacy-preserving mostly rely on an ideal hardware device called tamper-proof device (TPD) equipped in vehicles. Achieving fast authentication during the message verification process is usually challenging in such strategies and further they suffer performance constraints from resulting overheads. To address such challenges, this paper proposes a novel Chinese remainder theorem (CRT)-based conditional privacy-preserving authentication scheme for securing vehicular authentication. The proposed protocol only requires realistic TPDs, and eliminates the need for pre-loading the master key onto the vehicle's TPDs. Chinese remainder theorem can dynamically assist the trusted authorities (TAs) whilst generating and broadcasting new group keys to the vehicles in the network. The proposed scheme solves the leakage problem during side channel attacks, and ensures higher level of security for the entire system. In addition, the proposed scheme avoids using the bilinear pairing operation and map-to-point hash operation during the authentication process, which helps achieving faster verification even under increasing number of signature. Moreover, the security analysis shows that our proposed scheme is secure under the random oracle model and the performance analysis shows that our proposed scheme is efficient in reducing computation and communication overheads.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available