Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Cryptanalysis of two Conditional Privacy Preserving Authentication schemes for VANETs

Version 1 : Received: 7 October 2023 / Approved: 9 October 2023 / Online: 10 October 2023 (12:20:13 CEST)

How to cite: Kabil, A.M.; Aslan, H.; Azer, M. Cryptanalysis of two Conditional Privacy Preserving Authentication schemes for VANETs. Preprints 2023, 2023100641. https://doi.org/10.20944/preprints202310.0641.v1 Kabil, A.M.; Aslan, H.; Azer, M. Cryptanalysis of two Conditional Privacy Preserving Authentication schemes for VANETs. Preprints 2023, 2023100641. https://doi.org/10.20944/preprints202310.0641.v1

Abstract

Conditional Privacy Preserving Authentication (CPPA) schemes are an effective way of securing communications in Vehicular Adhoc Networks (VANETs), as well as ensuring user privacy and accountability. Cryptanalysis plays a crucial role in pointing out the vulnerabilities in existing schemes to enable the development of more resilient ones. In 2019, Zhang proposed a CPPA scheme for VANET security (PA-CRT), based on identity batch verification (IBV) and Chinese remainder theorem (CRT). In 2023, this scheme was crypt-analyzed by Tao. In this paper we provide our own crypt analysis of Zhang’s scheme and propose counter measures to mitigate Tao’s attacks. Furthermore, in 2021, Xiong proposed a Certificateless Aggregate Signature (CLAS) scheme which was cryptanalyzed by Shim in 2023. Xiong subsequently proposed a modified CLAS scheme which is also cryptanalyzed in this paper.

Keywords

vehicular adhoc networks; conditional privacy preserving authentication schemes; identity based batch verification; certificateless aggregate signature schemes

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.