Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks

In this paper, we design an access control mechanism for vehicular ad hoc network environment to enable only authorized vehicles to access data using attribute based encryption. The existing access control schemes are expensive in the sense that the ciphertext-length grows linearly with the number of attributes occurring in the access policy and the number of pairings needed for decryption is linear to the minimum number of attributes satisfying the access policy to decrypt a message. The main emphasis of our proposed construction is that it uses a constant number of pairings during encryption and decryption, while having a significant improvement in the communication overhead as compared to the existing schemes. We provide a concrete security analysis of our scheme in the generic group model. On a more positive note, our scheme resists collusion attacks made between any number of vehicles.

[1]  Kazuki Yoneyama,et al.  Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.

[2]  Jelena V. Misic,et al.  Privacy and Anonymity in VANETs: A Contemporary Study , 2010, Ad Hoc Sens. Wirel. Networks.

[3]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[4]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[5]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[6]  Robin Milner,et al.  On Observing Nondeterminism and Concurrency , 1980, ICALP.

[7]  Ronald Cramer,et al.  Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.

[8]  Stefan Katzenbeisser,et al.  Distributed Attribute-Based Encryption , 2009, ICISC.

[9]  Hideki Imai,et al.  Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[10]  Amit Sahai,et al.  Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.

[11]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[12]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[13]  Ivan Stojmenovic,et al.  Improved Access Control Mechanism in Vehicular Ad Hoc Networks , 2011, ADHOC-NOW.

[14]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[15]  Rosario Gennaro,et al.  Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings , 2011, Public Key Cryptography.

[16]  Nuttapong Attrapadung,et al.  Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.

[17]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[18]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[19]  Atsuko Miyaji,et al.  A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2010, Int. J. Appl. Cryptogr..

[20]  Javier Herranz,et al.  Constant Size Ciphertexts in Threshold Attribute-Based Encryption , 2010, Public Key Cryptography.

[21]  Aggelos Kiayias,et al.  BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..

[22]  Dijiang Huang,et al.  ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks , 2009, Ad Hoc Networks.

[23]  Aggelos Kiayias,et al.  Multi-query Computationally-Private Information Retrieval with Constant Communication Rate , 2010, Public Key Cryptography.

[24]  Debasish Jena,et al.  Security in vehicular adhoc networks: a survey , 2011, ICCCS '11.

[25]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.