DOI QR코드

DOI QR Code

Self Generable Conditionally Anonymous Authentication System for VANET

VANET를 위한 차량자체생성 조건부익명 인증시스템

  • Published : 2009.08.31

Abstract

Messages exchanged among vehicles must be authenticated in order to provide collision avoidance and cooperative driving services in VANET. However, digitally signing the messages can violate the privacy of users. Therefore, we require authentication systems that can provide conditional anonymity. Recently, Zhang et al. proposed conditionally anonymous authentication system for VANET using tamper-resistant hardware. In their system, vehicles can generate identity-based public keys by themselves and use them to sign messages. Moreover, they use batch verification to effectively verify signed messages. In this paper, we provide amelioration to Zhang et al.'s system in the following respects. First, we use a more efficient probabilistic signature scheme. Second, unlike Zhang et al., we use a security proven batch verification scheme. We also provide effective solutions for key revocation and anonymity revocation problems.

충돌회피, 협력운전과 같은 서비스를 차량 애드혹 네트워크(VANET. Vehicular Ad hoc NETwork)에서 제공하기 위해서는 차량 간 교환되는 메시지의 인증이 매우 중요하다. 하지만 일반 전자서명 기법을 사용할 경우에는 프라이버시 침해 문제가 발생할 수 있어, 조건부 익명성을 제공하는 인증시스템이 필요하다. 최근에 Zhang 등은 조작불가능한 하드웨어를 활용하는 VANET를 위한 조건부 익명 인증시스템을 제안하였다. 이 시스템은 차량에서 조건부익명성이 보장되는 신원기반의 공개키 쌍을 생성하여 메시지를 서명하여 교환한다. 또한 많은 메시지를 효과적으로 검증하기 위해 일괄 확인 기법을 사용한다. 이 논문에서는 Zhang 등의 시스템을 다음 측면에서 개선한다. 첫째, 보다 효율적인 확률 서명기법을 사용한다. 둘째, Zhang 등과 달리 안전성이 증명된 일괄확인 기법을 사용한다. 이 밖에 키 철회 문제, 익명 철회 문제 등에 대한 효과적인 해결방안도 제시한다.

Keywords

References

  1. M. Raya and J. Hubaux, 'Securing Vehicular Ad hoc Networks,' J. of Computer Security, vol. 15, no. 1. pp. 39-68, Jan. 2007 https://doi.org/10.3233/JCS-2007-15103
  2. X. Lin, X. Sun, P. Ho, and X. Shen, 'GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications,' IEEE Trans. on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007 https://doi.org/10.1109/TVT.2007.906878
  3. G. Calandriello, P. Papadimitratos, J. Hubaux, and A. Lioy, 'Efficient and Robust Pseudonymous Authentication in VANET,' Proc. of the 4th ACM Int. Workshop on Vehicular Ad Hoc Networks, pp. 19-28, Sep. 2007 https://doi.org/10.1145/1287748.1287752
  4. Y. Xi, K. Sha, W. Shi, L. Schwiebert, and T. Zhang, 'Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks,' Proc. of the 8th Int. Symp. on Autonomous Decentralized Systems, pp. 344-351, Mar. 2007
  5. R. Lu, X. Lin, H. Zhu, P. Ho, and X. Shen, 'ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications,' Proc. of the IEEE INFOCOM 2008, pp. 1229-1237, Apr. 2008
  6. X. Lin, C. Zhang, X. Sun, P. Ho, and X. Shen, 'TSVC: Efficient and Secure Vehicular Communications with Privacy Preserving,' IEEE Trans. on Wireless Communications, vol. 7, no. 12, pp. 4987-4998, Dec. 2008 https://doi.org/10.1109/T-WC.2008.070773
  7. C. Zhang, R. Lu, X. Lin, P. Ho, and X. Shen, 'An Efficient Identity-based Batch Verification Scheme for Vehicular Sensor Networks,' Proc. of the IEEE INFOCOM 2008, pp. 246-350, Apr. 2008
  8. C. Zhang, X. Lin, R. Lu, P. Ho, and X. Shen, 'An Efficient Message Authentication Scheme for Vehicular Communications,' IEEE Trans. on Vehicular Technology, vol. 57, no. 6, pp. 3357-3368, Nov. 2008 https://doi.org/10.1109/TVT.2008.928581
  9. D. Boneh, B. Lynn, and H. Shacham, 'Short Signatures from Weil Pairing,' J. of Cryptology, vol. 17, no. 4, pp. 297-319, Apr. 2004 https://doi.org/10.1007/s00145-004-0314-9
  10. M. Bellare, J.A. Garay, and T. Rabin, 'Fast Batch Verification for Modular Exponentiation and Digital Signatures,' Advances in Cryptology, Eurocrypt 1998, LNCS 1403, pp. 236-250, 1998
  11. J. Cha and J. Cheon, 'An Identity-based Signature from Gap Diffie-Hellman Groups,' Proc. of the Public Key Cryptography 2003, LNCS 2567, pp. 18-30, 2003
  12. H. Yoon, J. Cheon, and Y. Kim, 'Batch Verifications with ID-based Signatures,' Proc. of International Conference on Information Security and Cryptology 2004, LNCS 3506, pp. 233-248, 2005
  13. F. Hess, 'Efficient Identity based Signature Schemes based on Pairings,' Proc. of the International Workshop on Selected Areas in Cryptography 2002, LNCS 2595, pp. 310-324, 2002
  14. D. Boneh, X. Boyen, and H. Shacham, 'Short Group Signatures,' Advances in Cryptology, Crypto 2004, LNCS 3027, pp. 41-55, 2004