Jintao Jiao, Lei Guo, Wensen Yu, Sheng Yang, Shaozi Li
{"title":"An Efficient Lattice-Based Heterogeneous Signcryption Scheme for VANETs","authors":"Jintao Jiao, Lei Guo, Wensen Yu, Sheng Yang, Shaozi Li","doi":"10.1002/cpe.8384","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Nowadays, vehicular ad-hoc networks (VANETs) offer increased convenience to drivers and enable intelligent traffic management. However, the public wireless transmission channel in VANETs brings challenges related to security vulnerabilities and privacy leakage, in addition, vehicles produced by different manufacturers may use different cryptosystems such as certificateless cryptosystems (CLCs) and identity-based cryptosystems (IBC). To address privacy leakage during cross-cryptosystem communication in VANETs, we propose a lattice-based heterogeneous signcryption scheme named LHS-C2I. The scheme facilitates secure multi-cryptosystem bidirectional communication as CLC-based vehicles to IBC-based vehicles and IBC-based vehicles to CLC-based vehicles. The confidentiality and authenticity of LHS-C2I help to prevent the users from privacy leakage during cross-cryptosystem communication and to authenticate the message integrity and the sender's identity legitimacy. The proposed scheme is proven to achieve Indistinguishability under Chosen Ciphertext Attack (IND-CCA2) and Existential Unforgeability against Adaptive Chosen Messages Attack (EUF-CMA) within the random oracle model. Performance analysis demonstrates that LHS-C2I outperforms existing schemes in terms of computational overhead, communication overhead, and overall security features. It is particularly well-suited for scenarios requiring secure communication across different cryptosystems in VANETs.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 3","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.8384","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0
Abstract
Nowadays, vehicular ad-hoc networks (VANETs) offer increased convenience to drivers and enable intelligent traffic management. However, the public wireless transmission channel in VANETs brings challenges related to security vulnerabilities and privacy leakage, in addition, vehicles produced by different manufacturers may use different cryptosystems such as certificateless cryptosystems (CLCs) and identity-based cryptosystems (IBC). To address privacy leakage during cross-cryptosystem communication in VANETs, we propose a lattice-based heterogeneous signcryption scheme named LHS-C2I. The scheme facilitates secure multi-cryptosystem bidirectional communication as CLC-based vehicles to IBC-based vehicles and IBC-based vehicles to CLC-based vehicles. The confidentiality and authenticity of LHS-C2I help to prevent the users from privacy leakage during cross-cryptosystem communication and to authenticate the message integrity and the sender's identity legitimacy. The proposed scheme is proven to achieve Indistinguishability under Chosen Ciphertext Attack (IND-CCA2) and Existential Unforgeability against Adaptive Chosen Messages Attack (EUF-CMA) within the random oracle model. Performance analysis demonstrates that LHS-C2I outperforms existing schemes in terms of computational overhead, communication overhead, and overall security features. It is particularly well-suited for scenarios requiring secure communication across different cryptosystems in VANETs.
期刊介绍:
Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of:
Parallel and distributed computing;
High-performance computing;
Computational and data science;
Artificial intelligence and machine learning;
Big data applications, algorithms, and systems;
Network science;
Ontologies and semantics;
Security and privacy;
Cloud/edge/fog computing;
Green computing; and
Quantum computing.