Ring Signature Based on Lattice and VANET Privacy Preservation

被引:0
|
作者
Cui Y.-Q. [1 ]
Cao L. [1 ]
Zhang X.-Y. [1 ]
Zeng G.-X. [2 ]
机构
[1] School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan
[2] Department of Computer Science, University of Hong Kong
来源
关键词
Lattice signature; Privacy preservation; Ring signature; Traceability; VANET;
D O I
10.11897/SP.J.1016.2019.00980
中图分类号
学科分类号
摘要
In contemporary society, Vehicular Ad-hoc Network (VANET) has been a hot research topic in academic as well as other fields, such as intelligent transportation field. The application, VANET, has some charming strengths: (1) it can provide more convenient service for drivers and traffic managers (e.g. real time traffic information system); (2) it also increases the safety of vehicle traffic (e.g. rear-end early warning system). Such kind of service or convenience is based on shared information from participant users. The information includes the time, the location and other information about the roads and traffic. Usually, the message is broadcasted among many vehicles or temporary networks. Thus, communications between vehicles can be easily eavesdropped by some malicious attackers, who may be one of the normal users among the networks. And the message can be used by malicious attackers to locate and track the vehicles in practice. Therefore, it is essential to preserve the privacy in VANET. To our knowledge, there are many scheme proposed to solve this problem and they can be classified into as follows: anonymous certification, pseudo ID, group signature and ring signature. And currently, the most accepted schemes are based on pseudo ID, where users need to change their identities regularly and which is easy to be implemented. However, if the identity is changed in a not appropriate time, then the solution may not be effective. As for the anonymous certification schemes, though they offer conditional traceability with high computational efficiency, the distribution, the revocation and the huge storage of these certifications become the thorny problems. And the group signature based schemes are convenient to form a temporary network automatically and also have the property of traceability and anonymity. However, a role in these scheme, named group administrator, becomes the bottleneck of security, who is powerful and is needed to be trusted by others. In this paper, we will focus on the ring signature scheme which is paid less attention than others. The reasons why we choose ring signature are the following: (1) in ring signature based schemes, ring members are equal when compared to that of group signature based scheme, since it has no administrator role, so it is better to preserve the privacy; (2) compared to the anonymous certificate scheme, it does not need to communicate with certificate authorities, ring signature scheme is more flexible and automatic; (3) although it is not as simple as pseudo ID based schemes, ring signature scheme can achieve a higher security level. The main contributions of this paper include the following. First, we try to put forward a lattice-based ring signature scheme to deal with the privacy problem in VANET for a higher security level. In recent years, it is a concern to the attacks of quantum algorithms and lattice-based encryption schemes attracts a lot of attention. Second, to achieve the goal of anonymity and traceability, we apply the non-interactive zero knowledge proof technology to our construction. As a result, when the authorities want to know the true identity of some senders or malicious attackers who broadcast incorrect message, it can be achieved under the cooperation of all ring members. © 2019, Science Press. All right reserved.
引用
收藏
页码:980 / 992
页数:12
相关论文
共 30 条
  • [1] Laurendeau C., Barbeau M., Secure anonymous broadcasting in vehicular networks, Proceedings of the IEEE Conference on Local Computer Networks 2007, pp. 661-668, (2007)
  • [2] Vijayakumar P., Azees M., Deborah L.J., CPAV: Computationally efficient privacy preserving anonymous authentication scheme for vehicular ad hoc networks, Proceedings of the 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing(CSCloud), pp. 62-67, (2015)
  • [3] Forster D., Kargl F., Lohr H., Et al., PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks(VANET), Proceedings of the 2014 IEEE Vehicular Networking Conference (VNC), pp. 25-32, (2014)
  • [4] Feiri M., Pielage R., Petit J., Et al., Pre-distribution of certificates for pseudonymous broadcast authentication in VANET, Proceedings of the 2015 IEEE 81st Vehicular Technology Conference(VTC Spring), pp. 1-5, (2015)
  • [5] Wasef A., Shen X., MAAC: Message authentication acceleration protocol for vehicular ad-hoc network, Proceedings of the IEEE Global Telecommunications Conference, pp. 4476-4481, (2009)
  • [6] Wasef A., Shen X., PPGCV: Privacy preserving group communications protocol for vehicular ad hoc networks, Proceedings of the IEEE International Conference on Communications, pp. 1458-1463, (2008)
  • [7] Tiwari D., Bhushan M., Yadav A., Et al., A novel secure authentication scheme for VANETs, Proceedings of the 20162nd International Conference on Computational Intelligence & Communication Technology (CICT), pp. 287-297, (2016)
  • [8] Yu R., Kang J., Huang X., Et al., MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks, IEEE Transactions on Dependable and Secure Computing, 13, 1, pp. 93-105, (2016)
  • [9] Shao J., Lin X., Lu R., Et al., A threshold anonymous authentication protocol for VANETs, IEEE Transactions on Vehicular Technology, 65, 3, pp. 1711-1720, (2016)
  • [10] Chaurasia B.K., Verma S., Conditional privacy through ring signature in vehicular ad-hoc networks, Proceedings of the Transactions on Computational Science XIII, pp. 147-156, (2011)