Abstract
Vehicular ad hoc networks (VANETs) has been paid more and more attention by the researchers and industry. Recently, Bayat et al. proposed a secure authentication scheme of VANETs with batch verification. Based on the computational Diffie–Hellman (CDH) assumption, they claimed that their scheme was secure. Unfortunately, we find that the scheme presented by Bayat et al. is insecure in their security model. It cannot resist the adversary attack so that a malicious vehicle can forge arbitrarily legal vehicle’s signature on any message. We give a concrete attack process. Furthermore, we provide a batch verification certificateless signature scheme for VANETs. Based on the CDH assumption, we prove that the presented scheme is secure against adaptively chosen message attack in the random oracle model. The performance analysis shows that our scheme is more suitable for realistic applications.
Similar content being viewed by others
References
Wang, F. Y., Zeng, D., & Yang, L. (2006). Smart cars on smart roads: An IEEE intelligent transportation systems society update. IEEE Pervasive Computing,5(4), 68–69.
Lee, U., Zhou, B., Gerla, M., & Magistretti, E. (2006). Mobeyes: Smart mobs for urban monitoring with a vehicular sensor network. IEEE Wireless Communications,13(5), 52–57.
Misener, J. A. (2005). Vehicle-infrastructure integration (VII) and satety: Rubber and radio meets the road in california. Intellimotion,11(2), 1–3.
Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2006). Securing mobile ad hoc networks with certificateless public keys. IEEE Transactions on Dependable and Secure Computing,3(4), 386–399.
Zhang, C., Lu, R., Lin, X., Ho, P.-H., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In: The 27th IEEE communications society conference on computer communications (INFOCOM 2008) (pp. 816–824).
Huang, J.-L., Yeh, L.-Y., & Chien, H.-Y. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology,60(1), 248–262.
Chim, T. W., Yiu, S.-M., Hui, L. C., & Li, V. O. (2011). SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks,9(2), 189–203.
Wang, H., & Zhang, Y. (2012). On the security of an anonymous batch authenticated and key agreement scheme for value-added services in VANETs. Procedia Engineering,29, 1735–1739.
Zhang, C., Ho, P.-H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks,17(8), 1851–1865.
Lee, C. C., & Lai, Y. M. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks,19(6), 1441–1449.
Zhang, J., Xu, M., & Liu, L. (2014). On the security of a secure batch verification with group testing for VANET. International Journal of Network Security,16(5), 355–362.
Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks,21(5), 1733–1743.
Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT 2003 (pp. 452–473). Berlin: Springer.
Shamir, A. (1984). A identity-based cryptosystems and signature schemes. In Advances in cryptology-Crypto’84 (pp. 47–53). Berlin: Springer.
Tso, R., Yi, X., & Huang, X. (2011). Efficient and short certificateless signatures secure against realistic adversaries. The Journal of Supercomputing,55(2), 173–191.
Choi, K. Y., Park, J. H., & Lee, D. H. (2011). A new provably secure certificateless short signature scheme. Computers & Mathematics with Applications,61(7), 1760–1768.
He, D., Chen, J., & Zhang, R. (2012). An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems,25(11), 1432–1442.
Li, Jiguo, Zhao, Jingjing, & Zhang, Yichen. (2015). Certificateless online/offline signcryption scheme. Security and Communication Networks,8(11), 1979–1990.
He, D., Chen, Y., & Chen, J. (2013). An efficient certificateless proxy signature scheme without pairing. Mathematical and Computer Modelling,57(9–10), 2510–2518.
Yang, Lu, & Li, Jiguo. (2016). Provably secure certificateless proxy signature scheme in the standard model. Theoretical Computer Science,639, 42–59.
Yu, Y. T., Mu, Y., Wang, G., Xia, Q., & Yang, B. (2012). Improved certificateless signature scheme provably secure in the standard model. IET Information Security,6(2), 102–110.
Li, J., Huang, X., Mu, Y., & Wu, W. (2008). Cryptanalysis and improvement of an efficient certificateless signature scheme. Journal of Communications and Networks,10(10), 10–17.
He, D., Chen, J., & Hu, J. (2012). A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems,25(2), 221–230.
He, D., Huang, B., & Chen, J. (2013). New certificateless short signature scheme. IET Information Security,7(2), 113–117.
Li, Jiguo, Li, Yanqiong, & Zhang, Yichen. (2013). Provably secure forward secure certificateless proxy signature scheme. KSII Transactions on Internet and Information Systems,7(8), 1972–1988.
Li, J., Li, Y., & Zhang, Y. (2013). Forward secure certificateless proxy signature scheme. In J. Lopez, X. Huang, & R. Sandhu (Eds.), NSS 2013, LNCS (Vol. 7873, pp. 350–364).
Yang, Lu, Quanling, Zhang, & Jiguo, Li. (2015). An improved certificateless strong key-insulated signature scheme in the standard model. Advances in Mathematics of Communications,9(3), 353–373.
Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Advances in cryptology—CRYPTO 2001 (pp. 213–229). Berlin; Springer.
Pointcheval, D., & Stern, J. (1996). Security proofs for signature schemes. In Advances in cryptology—EUROCRYPT’96 (pp. 387–398). Berlin; Springer.
Shim, K.-A. (2012). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology,61(4), 1874–1883.
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (U1736112, 61772009, 61972095), Jiangsu Provincial Natural Science Foundation of China (BK20161511), Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, NJUPT.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Li, J., Zhang, Y. Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs. Wireless Pers Commun 111, 1255–1269 (2020). https://doi.org/10.1007/s11277-019-06912-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06912-y