TY - GEN
T1 - Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks
AU - Krzywiecki, Lukasz
AU - Salin, Hannes
AU - Panwar, Nisha
AU - Pavlov, Mykola
N1 - Funding Information:
The research was partially financed from the Fundamental Research Fund nr 8201003902 of the Wrocław University of Science and Technology.
Publisher Copyright:
© 2020 IEEE.
PY - 2020/11/24
Y1 - 2020/11/24
N2 - We propose a proxy signcryption scheme for a multi-party setting, resistant to randomness leakage and setup attacks. Our scheme is an alternative to typical constructions, based on a double Schnorr signature approach, where the linear combination of long term secrets and ephemeral random values occurs both at the initiator and proxy nodes. Our scheme is provably secure in a new stronger model, where the adversary can control the randomness of both parties. Moreover, our proposition is well suited for networks of many independent and moving nodes; especially modern railway infrastructure and vehicle-to-vehicle/infrastructure (V2X) environments, where a broad range of devices with potentially weak computational power and inadequate randomness, is used. Early benchmarks and performance analysis from our proof of concept implementation, suggest that nodes, which use regular Schnorr based schemes, could be successfully upgraded to our more secure alternative construction. Collected timings are still at the acceptable level, proving the applicability of our scheme in modern railway and V2X environments.
AB - We propose a proxy signcryption scheme for a multi-party setting, resistant to randomness leakage and setup attacks. Our scheme is an alternative to typical constructions, based on a double Schnorr signature approach, where the linear combination of long term secrets and ephemeral random values occurs both at the initiator and proxy nodes. Our scheme is provably secure in a new stronger model, where the adversary can control the randomness of both parties. Moreover, our proposition is well suited for networks of many independent and moving nodes; especially modern railway infrastructure and vehicle-to-vehicle/infrastructure (V2X) environments, where a broad range of devices with potentially weak computational power and inadequate randomness, is used. Early benchmarks and performance analysis from our proof of concept implementation, suggest that nodes, which use regular Schnorr based schemes, could be successfully upgraded to our more secure alternative construction. Collected timings are still at the acceptable level, proving the applicability of our scheme in modern railway and V2X environments.
KW - IoT
KW - cryptography
KW - railway
KW - signcryption
KW - vehicle
UR - http://www.scopus.com/inward/record.url?scp=85099733906&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85099733906&partnerID=8YFLogxK
U2 - 10.1109/NCA51143.2020.9306703
DO - 10.1109/NCA51143.2020.9306703
M3 - Conference contribution
AN - SCOPUS:85099733906
T3 - 2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020
BT - 2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020
A2 - Gkoulalas-Divanis, Aris
A2 - Marchetti, Mirco
A2 - Avresky, Dimiter R.
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 19th IEEE International Symposium on Network Computing and Applications, NCA 2020
Y2 - 24 November 2020 through 27 November 2020
ER -