z-logo
Premium
An efficient certificateless aggregate signature scheme for the Internet of Vehicles
Author(s) -
Zhao Yanan,
Hou Yingzhe,
Wang Lili,
Kumari Saru,
Khan Muhammad Khurram,
Xiong Hu
Publication year - 2020
Publication title -
transactions on emerging telecommunications technologies
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.366
H-Index - 47
ISSN - 2161-3915
DOI - 10.1002/ett.3708
Subject(s) - computer science , random oracle , signature (topology) , aggregate (composite) , cls upper limits , scheme (mathematics) , computer network , transmission (telecommunications) , cryptography , block (permutation group theory) , computer security , public key cryptography , distributed computing , encryption , telecommunications , mathematics , medicine , mathematical analysis , materials science , geometry , optometry , composite material
In recent years, the research of Internet of vehicles (IoV) has received extensive attention. In IoV, vehicles can make intelligent decisions by exchanging the real‐time traffic information between other vehicles and IoV infrastructures, thereby reducing the probability of traffic jams and accidents. Although IoV has many advantages, it is necessary to ensure that the data are not edited, forged, or disclosed during the transmission. Also, the certificateless signature (CLS) seems to be the solution to this problem. While in the high‐intensity data transmission environment, the CLS scheme is inefficient for application. To improve the efficiency, the function of aggregation was introduced into the CLS. The certificateless aggregate signature (CL‐AS) can aggregate multiple signatures into a brief signature, reducing the computational cost and the size of signature. Nevertheless, most of the recent proposed CL‐AS schemes have problems of security or efficiency. In this paper, we presented an advanced efficient CL‐AS scheme with elliptic curve cryptography for the IoV environment. In addition, the proposed scheme uses pseudonyms in communications to prevent vehicles from revealing their identity. We proved the security of our proposal in the random oracle based on computational Diffie‐Hellman assumption. Also, the efficiency analysis and simulation show the superiority of our scheme.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here