Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks

Lukasz Krzywiecki, Hannes Salin, Nisha Panwar, Mykola Pavlov

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We propose a proxy signcryption scheme for a multi-party setting, resistant to randomness leakage and setup attacks. Our scheme is an alternative to typical constructions, based on a double Schnorr signature approach, where the linear combination of long term secrets and ephemeral random values occurs both at the initiator and proxy nodes. Our scheme is provably secure in a new stronger model, where the adversary can control the randomness of both parties. Moreover, our proposition is well suited for networks of many independent and moving nodes; especially modern railway infrastructure and vehicle-to-vehicle/infrastructure (V2X) environments, where a broad range of devices with potentially weak computational power and inadequate randomness, is used. Early benchmarks and performance analysis from our proof of concept implementation, suggest that nodes, which use regular Schnorr based schemes, could be successfully upgraded to our more secure alternative construction. Collected timings are still at the acceptable level, proving the applicability of our scheme in modern railway and V2X environments.

Original languageEnglish (US)
Title of host publication2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020
EditorsAris Gkoulalas-Divanis, Mirco Marchetti, Dimiter R. Avresky
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728183268
DOIs
StatePublished - Nov 24 2020
Event19th IEEE International Symposium on Network Computing and Applications, NCA 2020 - Cambridge, United States
Duration: Nov 24 2020Nov 27 2020

Publication series

Name2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020

Conference

Conference19th IEEE International Symposium on Network Computing and Applications, NCA 2020
CountryUnited States
CityCambridge
Period11/24/2011/27/20

Keywords

  • IoT
  • cryptography
  • railway
  • signcryption
  • vehicle

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems and Management

Fingerprint Dive into the research topics of 'Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks'. Together they form a unique fingerprint.

Cite this