Skip to main content
Log in

Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Vehicular ad hoc networks (VANETs) has been paid more and more attention by the researchers and industry. Recently, Bayat et al. proposed a secure authentication scheme of VANETs with batch verification. Based on the computational Diffie–Hellman (CDH) assumption, they claimed that their scheme was secure. Unfortunately, we find that the scheme presented by Bayat et al. is insecure in their security model. It cannot resist the adversary attack so that a malicious vehicle can forge arbitrarily legal vehicle’s signature on any message. We give a concrete attack process. Furthermore, we provide a batch verification certificateless signature scheme for VANETs. Based on the CDH assumption, we prove that the presented scheme is secure against adaptively chosen message attack in the random oracle model. The performance analysis shows that our scheme is more suitable for realistic applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Wang, F. Y., Zeng, D., & Yang, L. (2006). Smart cars on smart roads: An IEEE intelligent transportation systems society update. IEEE Pervasive Computing,5(4), 68–69.

    Article  Google Scholar 

  2. Lee, U., Zhou, B., Gerla, M., & Magistretti, E. (2006). Mobeyes: Smart mobs for urban monitoring with a vehicular sensor network. IEEE Wireless Communications,13(5), 52–57.

    Article  Google Scholar 

  3. Misener, J. A. (2005). Vehicle-infrastructure integration (VII) and satety: Rubber and radio meets the road in california. Intellimotion,11(2), 1–3.

    MathSciNet  Google Scholar 

  4. Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2006). Securing mobile ad hoc networks with certificateless public keys. IEEE Transactions on Dependable and Secure Computing,3(4), 386–399.

    Article  Google Scholar 

  5. Zhang, C., Lu, R., Lin, X., Ho, P.-H., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In: The 27th IEEE communications society conference on computer communications (INFOCOM 2008) (pp. 816–824).

  6. Huang, J.-L., Yeh, L.-Y., & Chien, H.-Y. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology,60(1), 248–262.

    Article  Google Scholar 

  7. Chim, T. W., Yiu, S.-M., Hui, L. C., & Li, V. O. (2011). SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks,9(2), 189–203.

    Article  Google Scholar 

  8. Wang, H., & Zhang, Y. (2012). On the security of an anonymous batch authenticated and key agreement scheme for value-added services in VANETs. Procedia Engineering,29, 1735–1739.

    Article  Google Scholar 

  9. Zhang, C., Ho, P.-H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks,17(8), 1851–1865.

    Article  Google Scholar 

  10. Lee, C. C., & Lai, Y. M. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks,19(6), 1441–1449.

    Article  Google Scholar 

  11. Zhang, J., Xu, M., & Liu, L. (2014). On the security of a secure batch verification with group testing for VANET. International Journal of Network Security,16(5), 355–362.

    Google Scholar 

  12. Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks,21(5), 1733–1743.

    Article  Google Scholar 

  13. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT 2003 (pp. 452–473). Berlin: Springer.

  14. Shamir, A. (1984). A identity-based cryptosystems and signature schemes. In Advances in cryptology-Crypto’84 (pp. 47–53). Berlin: Springer.

  15. Tso, R., Yi, X., & Huang, X. (2011). Efficient and short certificateless signatures secure against realistic adversaries. The Journal of Supercomputing,55(2), 173–191.

    Article  Google Scholar 

  16. Choi, K. Y., Park, J. H., & Lee, D. H. (2011). A new provably secure certificateless short signature scheme. Computers & Mathematics with Applications,61(7), 1760–1768.

    Article  MathSciNet  Google Scholar 

  17. He, D., Chen, J., & Zhang, R. (2012). An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems,25(11), 1432–1442.

    Article  Google Scholar 

  18. Li, Jiguo, Zhao, Jingjing, & Zhang, Yichen. (2015). Certificateless online/offline signcryption scheme. Security and Communication Networks,8(11), 1979–1990.

    Article  Google Scholar 

  19. He, D., Chen, Y., & Chen, J. (2013). An efficient certificateless proxy signature scheme without pairing. Mathematical and Computer Modelling,57(9–10), 2510–2518.

    Article  MathSciNet  Google Scholar 

  20. Yang, Lu, & Li, Jiguo. (2016). Provably secure certificateless proxy signature scheme in the standard model. Theoretical Computer Science,639, 42–59.

    Article  MathSciNet  Google Scholar 

  21. Yu, Y. T., Mu, Y., Wang, G., Xia, Q., & Yang, B. (2012). Improved certificateless signature scheme provably secure in the standard model. IET Information Security,6(2), 102–110.

    Article  Google Scholar 

  22. Li, J., Huang, X., Mu, Y., & Wu, W. (2008). Cryptanalysis and improvement of an efficient certificateless signature scheme. Journal of Communications and Networks,10(10), 10–17.

    Article  Google Scholar 

  23. He, D., Chen, J., & Hu, J. (2012). A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems,25(2), 221–230.

    Article  Google Scholar 

  24. He, D., Huang, B., & Chen, J. (2013). New certificateless short signature scheme. IET Information Security,7(2), 113–117.

    Article  Google Scholar 

  25. Li, Jiguo, Li, Yanqiong, & Zhang, Yichen. (2013). Provably secure forward secure certificateless proxy signature scheme. KSII Transactions on Internet and Information Systems,7(8), 1972–1988.

    Article  Google Scholar 

  26. Li, J., Li, Y., & Zhang, Y. (2013). Forward secure certificateless proxy signature scheme. In J. Lopez, X. Huang, & R. Sandhu (Eds.), NSS 2013, LNCS (Vol. 7873, pp. 350–364).

  27. Yang, Lu, Quanling, Zhang, & Jiguo, Li. (2015). An improved certificateless strong key-insulated signature scheme in the standard model. Advances in Mathematics of Communications,9(3), 353–373.

    Article  MathSciNet  Google Scholar 

  28. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Advances in cryptologyCRYPTO 2001 (pp. 213–229). Berlin; Springer.

  29. Pointcheval, D., & Stern, J. (1996). Security proofs for signature schemes. In Advances in cryptologyEUROCRYPT’96 (pp. 387–398). Berlin; Springer.

  30. Shim, K.-A. (2012). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology,61(4), 1874–1883.

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (U1736112, 61772009, 61972095), Jiangsu Provincial Natural Science Foundation of China (BK20161511), Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, NJUPT.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiguo Li.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, J., Zhang, Y. Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs. Wireless Pers Commun 111, 1255–1269 (2020). https://doi.org/10.1007/s11277-019-06912-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06912-y

Keywords

Navigation