4.6 Article

An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks

Journal

IEEE TRANSACTIONS ON INTELLIGENT VEHICLES
Volume 8, Issue 4, Pages 2998-3011

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIV.2022.3216949

Keywords

Vehicle-to-grid; Privacy; Protocols; Security; Cryptocurrency; Authentication; Public key; Anonymous payment; privacy preservation; ring signature; V2G networks

Ask authors/readers for more resources

Vehicle-to-Grid (V2G) networks are potential solutions to energy and environmental challenges, but security is a key concern. To address the issue of private information leakage in V2G networks, we propose an efficient multilayered linkable ring signature scheme called Emularis, along with an anonymous payment scheme. Rigorous security analysis proves that Emularis ensures security and privacy requirements, while also outperforming existing schemes in terms of communication and computation costs.
Vehicle-to-Grid (V2G) networks are potential solutions to addressing energy and environmental challenges, although security remains a key concern. For example, attackers may seek to obtain private information from frequent electricity/service exchanges between electric vehicles (EVs) and smart grids (SG) in V2G networks. While there have been successful attempts in using ring signatures to achieve privacy-preserving payment and ensure reliable services in V2G many existing ring signature-based payment proposals has significant signature size. To address the aforementioned problem, we propose Emularis, an efficient multilayered linkable ring signature scheme with a logarithmic size. We also implement an anonymous payment scheme for V2G using Emularis. We then prove that Emularis guarantees security and privacy requirements through rigorous security analysis. Furthermore, our scheme significantly outperforms existing schemes in terms of communication and computation costs. Extensive experimental results indicate that our scheme is suitable for the deployment in V2G security-related applications.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available