Abstract
Automated Valet Parking (AVP) systems have great potential to mitigate parking pressure. The core of AVP is parking space reservation which users send relevant information to parking lot providers to complete the parking reservation and automatic parking. However, that reveals the drivers’ identity information and the reservation messages might be forged. In addition, with quantum computers developing rapidly, existing systems also suffer from privacy and security issues under quantum attacks. These become the major obstacles to the development of the AVP system. To deal with the above challenges, our paper proposes a lattice-based ring signature scheme for autonomous vehicles which is the first AVP privacy preservation system capable of resisting quantum attacks. More significantly, our system applies lattice-based ring signatures to ensure the correctness, anonymity and unforgeability of messages. Finally, security analyses are conducted to compare our system with others in terms of security and privacy, and also the efficiency analysis shows that the performance of our system is superior to others.
S. Xu and X. Chen—This work is supported in part by the National Natural Science Foundation of China under Grant 61802004 and Grant 61802005, and the Scientific Research Project of Beijing Educational Committee under Grant KM202010009008.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Wang, J., Cai, Z., Yu, J.: Achieving personalized \(k\)-anonymity-based content privacy for autonomous vehicles in CPS. IEEE Trans. Industr. Inf. 16(6), 4242–4251 (2020)
Xiong, Z., Xu, H., Li, W., Cai, Z.: Multi-source adversarial sample attack on autonomous vehicles. IEEE Trans. Veh. Technol. 70(3), 2822–2835 (2021)
Xiong, Z., Cai, Z., Han, Q., Alrawais, A., Li, W.: ADGAN: protect your location privacy in camera data of auto-driving vehicles. IEEE Trans. Ind. Inform. 17(9), 6200–6210 (2021)
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)
Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, vol. 8, pp. 212–219 (1996)
Cai, Z., Zheng, X., Yu, J.: A differential-private framework for urban traffic flows estimation via taxi companies. IEEE Trans. Industr. Inf. 15(12), 6492–6499 (2019)
Wang, C., Cheng, X., Li, J., He, Y., Xiao, K.: A survey: applications of blockchain in the internet of vehicles. EURASIP J. Wirel. Commun. Netw. 2021(1), 1–16 (2021)
Hu, C., Cheng, X., Tian, Z., Yu, J., Lv, W.: Achieving privacy preservation and billing via delayed information release. IEEE-ACM Trans. Netw. 29(3), 1376–1390 (2021)
Xu, S., Chen, X., He, Y.: EVchain: an anonymous blockchain based-system for charging-connected electric vehicles. Tsinghua Sci. Technol. 26(6), 845–856 (2021)
Ajtai, M.: Generating hard instances of lattice problems. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 99–108 (1996)
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, vol. 10, pp. 197–206 (2008)
Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai trees, or how to delegate a lattice basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523–552. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_27
Lyubashevsky, V.: Lattice signatures without trapdoors. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 738–755. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29011-4_43
Cayrel, P.-L., Lindner, R., Rückert, M., Silva, R.: A lattice-based threshold ring signature scheme. In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol. 6212, pp. 255–272. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14712-8_16
Fan, B., Andersen, D.G., Kaminsky, M., Mitzenmacher, M.D.: Cuckoo filter: practically better than bloom. In: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, no. 14, pp. 75–88 (2014)
Yang, J.H., Chang, C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3–4), 138–143 (2009)
Huang, C., Lu, R., Lin, X., Shen, X.: Secure automated valet parking: a privacy-preserving reservation scheme for autonomous vehicles. IEEE Trans. Veh. Technol. 67(11), 11169–11180 (2018)
Ni, J., Lin, X., Shen, X.: Toward privacy-preserving valet parking in autonomous driving era. IEEE Trans. Veh. Technol. 68(3), 2893–2905 (2019)
Wang, F.H., Hu, Y.P., Wang, C.X.: A lattice-based ring signature scheme from bonsai trees. J. Electron. Inf. Technol. 32(2), 2400–2403 (2010)
Wang, J., Sun, B.: Ring signature schemes from lattice basis delegation. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 15–28. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25243-3_2
Tian, M.M., Huang, L.S., Yang, W.: Efficient lattice-based ring signature scheme. Chin. J. Comput. 35(4), 713–717 (2012)
Cui, Y., Cao, L., Zhang, X., Zeng, G.: Ring signature based on lattice and VANET privacy preservation. Chin. J. Comput. 40(169), 1–14 (2017)
sdsdsd
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Xu, S., Chen, X., Wang, C., He, Y., Xiao, K., Cao, Y. (2021). A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking. In: Liu, Z., Wu, F., Das, S.K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol 12938. Springer, Cham. https://doi.org/10.1007/978-3-030-86130-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-86130-8_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-86129-2
Online ISBN: 978-3-030-86130-8
eBook Packages: Computer ScienceComputer Science (R0)