An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs

  • Jinhui Liu
  • Yong YuEmail author
  • Yanqi Zhao
  • Jianwei Jia
  • Shijia Wang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11058)


With the rapid development of Internet of Things (IoT), intelligent transportation systems (ITS) brings more and more intelligent and convenient services to people’s daily lives. Vehicular Ad hoc Networks (VANETs), as a typical application of ITS, is becoming an effective approach to manage traffic systems. However, VANETs still have to face to different security challenges in practice. In this paper, we develop a new identity-based double authentication preventing signature using bilinear pairings and then adopt it to propose a novel privacy preserving authentication scheme with deterable function based on our proposed identity-based double authentication preventing signature. This scheme provides secure authentication process for messages transmitted between vehicles and RSUs. A batch message verification mechanism is also supported by the proposed scheme to increase the message processing throughput of RSUs. And the security proof and performance analysis are presented. By comparing with other IBCPPA scheme in terms of the total time of pseudo identity generation and message signing phase and the execution times of batch verification, our proposed scheme is more efficient.


Vehicular ad-hoc networks Authentication protocol Double authentication preventing signature Bilinear pairing Elliptic curve 



This work was supported by the National Key R&D Program of China (2017YFB0802000), the National Natural Science Foundation of China (61772326, 61572303, 61872229, 61802239), NSFC Research Fund for International Young Scientists (61750110528), National Cryptography Development Fund during the 13th Five-year Plan Period (MMJJ20170216), Fundamental Research Funds for the Central Universities (GK201702004, GK201803061, 2018CBLY006) and China Postdoctoral Science Foundation (2018M631121).


  1. 1.
    Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRefGoogle Scholar
  2. 2.
    Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Ad Hoc Networks, pp. 19–28. ACM (2007)Google Scholar
  3. 3.
    Huang, D., Misra, S., Verma, M., Xue, G.: PACP: an efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 12(3), 736–746 (2011)CrossRefGoogle Scholar
  4. 4.
    Sun, Y., Lu, R., Lin, X., Shen, X., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(7), 3589–3603 (2010)CrossRefGoogle Scholar
  5. 5.
    Chim, T.W., Yiu, S.-M., Hui, L.C.K., Li, V.O.K.: OPQ: OT-based private querying in VANETs. IEEE Trans. Intell. Transp. Syst. 12(4), 1413–1422 (2011)CrossRefGoogle Scholar
  6. 6.
    Gonzalez-Tablas, A., Alcaide, A., de Fuentes, J., Montero, J.: Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations. Ad Hoc Netw. 11(8), 2693–2709 (2013)CrossRefGoogle Scholar
  7. 7.
    Chen, L., Ng, S.L., Wang, G.: Threshold anonymous announcement in VANETs. IEEE J. Sel. Areas Commun. 29(3), 605–615 (2011)CrossRefGoogle Scholar
  8. 8.
    Kounga, G., Walter, T., Lachmund, S.: Proving reliability of anonymous information in VANETs. IEEE Trans. Veh. Technol. 58(6), 2977–2989 (2009)CrossRefGoogle Scholar
  9. 9.
    Lin, X., Sun, X., Ho, P.H., Shen, X.: GSIS: secure vehicular communications with privacy preserving. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRefGoogle Scholar
  10. 10.
    Lin, X., Sun, X., Ho, P.H., Shen, X.: Security in vehicular ad hoc networks. IEEE Commun. Mag. 46(4), 88–95 (2008)CrossRefGoogle Scholar
  11. 11.
    Sun, J., Zhang, C., Zhang, Y., Fang, Y.: An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 21(9), 1227–1239 (2010)CrossRefGoogle Scholar
  12. 12.
    Au, M.H., Liu, J.K., Susilo, W., Yuen, T.H.: Secure id-based linkable and revocable-iff-linked ring signature with constant-size construction. Theor. Comput. Sci. 469, 1–14 (2013)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Chaurasia, B.K., Verma, S.: Conditional privacy through ring signature in vehicular ad-hoc networks. Trans. Comput. Sci. 13, 147–156 (2011)Google Scholar
  14. 14.
    Yuen, T.H., Liu, J.K., Au, M.H., Susilo, W., Zhou, J.: Efficient linkable and/or threshold ring signature without random oracles. Comput. J. 56(4), 407–421 (2013)CrossRefGoogle Scholar
  15. 15.
    Chim, T.W., Yiu, S.-M., Hui, L.C., Li, V.O.: SPECS: secure and privacy enhancing communications schemes for vanets. Ad Hoc Netw. 9(2), 189–203 (2011)CrossRefGoogle Scholar
  16. 16.
    Horng, S.-J., et al.: B-SPECS+: batch verification for secure pseudonymous authentication in vanet. IEEE Trans. Inf. Forensics Secur. 8(11), 1860–1875 (2013)CrossRefGoogle Scholar
  17. 17.
    Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: APPA: aggregate privacy-preserving authentication in vehicular ad hoc networks. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 293–308. Springer, Heidelberg (2011). Scholar
  18. 18.
    Zhang, C., Ho, P.H., Tapolcai, J.: On batch verification with group testing for vehicular communications. Wirel. Netw. 17(8), 1851–1865 (2011)CrossRefGoogle Scholar
  19. 19.
    Lee, C.C., Lai, Y.M.: Toward a secure batch verification with group testing for vanet. Wirel. Netw. 19(6), 1441–1449 (2012)CrossRefGoogle Scholar
  20. 20.
    Shim, K.A.: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61(4), 1874–1883 (2012)CrossRefGoogle Scholar
  21. 21.
    Jianhong, Z., Min, X., Liying, L.: On the security of a secure batch verification with group testing for vanet. Int. J. Netw. Secur. 16(5), 351–358 (2014)Google Scholar
  22. 22.
    Lee, C.C., Lai, Y.M.: Toward a secure batch verification with group testing for vanet. Wirel. Netw. 19(6), 1441 (2013)CrossRefGoogle Scholar
  23. 23.
    Liu, J.K., Yuen, T.H., Au, M.H., Susilo, W.: Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41(5), 2559–2564 (2014)CrossRefGoogle Scholar
  24. 24.
    Bayat, M., Barmshoory, M., Rahimi, M., Aref, M.R.: A secure authentication scheme for VANETs with batch verification. Wirel. Netw. 21(5), 1–11 (2014)Google Scholar
  25. 25.
    He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identitybased conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681–2691 (2015)CrossRefGoogle Scholar
  26. 26.
    Zhong, H., Wen, J., Cui, J., Zhang, S.: Efficient conditional privacy preserving and authentication scheme for secure service provision in vanet. Tsinghua Sci. Technol. 21(6), 620–629 (2016)CrossRefGoogle Scholar
  27. 27.
    Zhong, H., Huang, B., Cui, J., Xu, Y., Liu, L.: Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. IEEE Access 6, 2241–2250 (2018)CrossRefGoogle Scholar
  28. 28.
    Poettering, B., Stebila, D.: Double-authentication-preventing signatures. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 436–453. Springer, Cham (2014). Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Jinhui Liu
    • 1
  • Yong Yu
    • 1
    Email author
  • Yanqi Zhao
    • 1
  • Jianwei Jia
    • 2
  • Shijia Wang
    • 3
  1. 1.School of Computer ScienceShaanxi Normal UniversityXi’anChina
  2. 2.Computer School of Wuhan UniversityWuhanChina
  3. 3.Department of Statistics and Actuarial ScienceSimon Fraser UniversityBurnabyCanada

Personalised recommendations