A Novel Computationally Efficient Group Signature for Anonymous and Secure V2X Communications

07/25/2023
by   Jia Liu, et al.
0

The use of vehicle-to-everything (V2X) communication is expected to significantly improve road safety and traffic management. We present an efficient protocol, called the AEE protocol, for protecting data authenticity and user privacy in V2X applications. Our protocol provides event-based likability, which enables messages from a subject vehicle to be linked to a specific event in order to prevent Sybil attacks. Messages on different events are unlinkable to preserve the long-term privacy of vehicles. Moreover, our protocol introduces a new method for generating temporary public keys to reduce computing and transmission overheads. Such a temporary public key is bound with a certain event and is automatically revoked when the event is over. We describe how to apply our protocol in vehicular communications using two exemplar use cases. To further reduce the real-time computational complexity, our protocol enables us to decompose the cryptographic operations into offline processes for complex operations and real-time processes for fast computations.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/17/2018

BARS: a Blockchain-based Anonymous Reputation System for Trust Management in VANETs

The public key infrastructure (PKI) based authentication protocol provid...
research
12/28/2017

A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks

Public key infrastructure (PKI) is the most widely used security mechani...
research
06/07/2022

Topos: A Secure, Trustless, and Decentralized Interoperability Protocol

Topos is an open interoperability protocol designed to reduce as much as...
research
04/07/2022

Semantic-functional Communications for Multiuser Event Transmissions via Random Maps

This work introduces a new perspective for physical media sharing in mul...
research
05/13/2021

The Inductive Approach to Verifying Cryptographic Protocols

Informal arguments that cryptographic protocols are secure can be made r...
research
05/06/2021

Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol

Vehicular networks will enable a range of novel applications to enhance ...

Please sign up or login with your details

Forgot password? Click here to reset