In vehicular ad hoc networks, establishing a secure channel between any two vehicles is fundamental. Authenticated key agreement is a useful mechanism, which can be used to negotiate a shared key for secure data transmission between authentic vehicles in vehicular ad hoc networks. Among the existing identity-based two-party authenticated key agreement protocols without pairings, there are only a few protocols that provide provable security in strong security models such as the extended Canetti–Krawczyk model. This article presents an efficient pairing-free identity-based one-round two-party authenticated key agreement protocol with provable security, which is more suitable for real-time application environments with highly dynamic topology such as vehicular ad hoc networks than the existing identity-based two-party authenticated key agreement protocols. The proposed protocol is proven secure under the passive and active adversaries in the extended Canetti–Krawczyk model based on the Gap Diffie–Hellman assumption. The proposed protocol can capture all essential security attributes including known-session key security, perfect forward secrecy, basic impersonation resistance, key compromise impersonation resistance, unknown key share resistance, no key control, and ephemeral secrets reveal resistance. Compared with the existing identity-based two-party authenticated key agreement protocols, the proposed protocol is superior in terms of computational cost and running time while providing higher security.
The significant advances in the embedded technology and wireless communication drive the evolution of vehicular ad hoc networks (VANETs). Vehicular networks comprise three types of components: a trusted authority, road-side units (RSUs) distributed on the roadside, and Connected and Autonomous Vehicles (CAVs) with on-board units (OBUs). Drivers can make some decisions based on the sensed road and traffic information transmitted from other CAVs and RSUs nearby. In many VANET applications such as pothole collection,1 file sharing among familiar entities,2 and infotainment applications, the messages exchanged between two vehicles are sensitive and need to be kept secret. Due to the open nature of wireless links, it is crucial for VANETs to establish secure communications between any two vehicles. Compared with traditional public key encryption, symmetric key encryption with a shared key is more efficient in providing confidential communication. Authenticated key agreement (AKA) is an appealing mechanism in which authentic parties can agree on a shared session key over an open network to ensure the confidentiality, authentication, or integrity of subsequent session messages. For instance, in the literatures,3–5 a key agreement protocol is used for a vehicle to update its pseudonym-private key pairs. In the literature,6 a key agreement protocol is used to establish a vehicular cloud. In addition, AKA protocols achieve implicit authentication, that is, each party is assured that no party but the intended peers can possibly generate the shared session key, which is important in key agreement. The shared session key, which is generated from two or more parties as a function of their long-term keys and ephemeral materials, cannot be predetermined.
In 1993, Bellare and Rogaway7 first presented a security model to formalize symmetric key-based AKA protocols. Based on the Bellare-Rogaway (BR) model, some security models for other types of AKA protocols were formalized, for example, AKA protocols with a trusted server,8 AKA with key confirmation (AKC) protocols,9 asymmetric key-based AKA protocols,10 and AKA protocols against dictionary attack.11 However, these models do not capture ephemeral secrets reveal attack. The Canetti–Krawczyk (CK) model12 proposed in 2001 also does not completely cover ephemeral secrets reveal resistance (ESRR) because it cannot support the adversary’s Session-State Reveal queries against the test session. In addition, the CK model also does not catch forward security (FS) and key compromise impersonation resistance (KCIR). In 2005, Choo et al.13 examined and compared the differences among these security models. Subsequently, LaMacchia et al.14 made the extended CK (eCK) model to prove the security of AKA protocols in 2007. The eCK model can capture all essential security attributes including known-session key security (K-SKS), perfect forward security (PFS), basic impersonation resistance (BIR), KCIR, unknown key share resistance (UKSR), no key control (NKC), ESRR, and so on. Therefore, AKA protocols should be given formal proofs in the eCK model.
According to the number of involving parties, the existing AKA protocols are divided into three categories: (1) authenticated group KA protocols, (2) three-party AKA protocols, and (3) two-party AKA (2PAKA) protocols. According to the public key setting employed, previously proposed asymmetric key-based AKA protocols are roughly classified into three groups: (1) traditional public key infrastructure (PKI)-based AKA protocols, (2) identity (ID)-based AKA protocols, and (3) certificateless AKA protocols. In the traditional PKI-based 2PAKA protocols, the management of public key certificates is a heavy burden, which contains the maintenance, transmission, and authentication of certificates. To eliminate the certificate management problem, many research works15–33 employed ID-based cryptography (IBC) first introduced by Shamir,34 in which a user’s public key is the user’s identities (e.g. telephone number, e-mail address, etc.) and the user’s private key is extracted based on his or her ID and a key generation center (KGC) master key. Therefore, these ID-based 2PAKA protocols15–33 have improved the efficiency by removing the use of public key certificates. However, these ID-based 2PAKA protocols15–33 were built using bilinear pairings, which is seen to be one of the most time-consuming operations. The operation cost of a pairing is about 3 to 20 times that of an elliptic curve point multiplication.25,35,36 Consequently, in order to accomplish a better performance, some ID-based 2PAKA protocols without pairings35,37–49 have been proposed. Unfortunately, among these pairing-free ID-based 2PAKA protocols,35,37–49 only a few protocols46–48 provide provable security in the eCK model. Moreover, the running times of these protocols46–48 need to be further reduced if they are deployed in real-time application environments with highly dynamic topology such as VANETs. The reason is that the time for key agreement between any two vehicles should be minimized considering the fast moving and topology dynamic natures of VANETs. In addition, ID-based 2PAKA protocol with two message exchanges may be more attractive in reality. Therefore, it is a challenge to design a provably secure and efficient pairing-free ID-based one-round 2PAKA protocol that is more suitable for VANETs.
Related works
Since Boneh and Franklin50 first presented an ID-based encryption scheme from pairings in 2001, a great deal of ID-based 2PAKA protocols15–33 have been designed using pairings, and some of them have been pointed out having security flaws later. These protocols were continuously devoted to seek a secure ID-based 2PAKA protocol with minimal pairing operations.
In order to remove the expensive pairing operation, Zhu et al.37 started the research of pairing-free ID-based 2PAKA protocol in 2007. However, Zhu et al.’s protocol realizes explicit authentication by introducing an ID-based signature scheme, which leads to larger computational cost and bandwidth. In addition, Zhu et al.’s protocol requires three message exchanges. After 1 year, Cao et al.38 put forward an ID-based 2PAKA protocol without pairings, which achieves implicit authentication but requires the same message exchanges as Zhu et al.’s protocol. In 2010, Fiore and Gennaro39 presented an ID-based 2PAKA protocol using exponentiation operation, which is proven secure in the CK model. However, the CK model cannot cover FS, KCIR, and ESRR. In order to reduce the message exchange, Cao et al.35 proposed another ID-based two-message 2PAKA protocol without pairings in 2010. Unfortunately, Hou and Xu40,41 and Islam and Biswas42 independently demonstrated that two protocols proposed by Cao et al. are vulnerable to ephemeral secrets reveal attack, in 2011 and 2012. However, Hou et al. and Islam et al.’s informal security analysis cannot guarantee that their protocols satisfy all essential security properties. Moreover, Islam et al.’s42 protocol requires three message exchanges and the last message exchange may be intercepted by adversaries, which enable the two involved parties to have different session keys. In 2012, Xie and Wang43 used a signature scheme to realize mutual authentication in their protocol, which causes computation cost to be increased. In 2013, Vivek et al.44 put forward an ID-based 2PAKA protocol using exponentiation, which is provable secure in the CK model. Nevertheless, the CK model cannot ensure Vivek et al.’s protocol catches FS, KCIR, and ESRR. In addition, Vivek et al.’s protocol involves more exponentiation operations than Fiore et al.’s protocol. In 2015, Ghoreishi et al.45 and Sun et al.,46 respectively, presented two pairing-free ID-based 2PAKA protocols. Ghoreishi et al. only analyzed the security of their protocol informally and roughly. It is clear that Ghoreishi et al.’s protocol cannot resist key compromise impersonation attack. Sun et al.’s protocol needs six elliptic curve point multiplication operations. Moreover, the formal proof in the eCK model does not take active adversaries into account. In 2016, Bala et al.47 put forward an ID-based 2PAKA protocols without pairings, which only needs four elliptic curve point multiplication operations. However, the security proof in the eCK model also does not consider active adversaries. In the same year, two other ID-based 2PAKA protocols were proposed by Ni et al.,48 which require seven and five elliptic curve point multiplication operations, respectively. Ni et al.’s protocols are given the formal proofs under the passive and active adversaries in the eCK model. In 2017, Islam and Biswas49 put forward a pairing-free ID-based 2PAKA protocol. Unfortunately, the security analysis using Burrows-Abadi-Needham (BAN) logic model cannot guarantee that Islam et al.’s protocol is secure.51
Our contributions
Our contributions are as below:
Our ID-based 2PAKA protocol is proven to be secure under the passive and active adversaries in the eCK model. Therefore, it can capture all essential security attributes including K-SKS, PFS, BIR, KCIR, UKSR, NKC,ESRR, and so on, which is also analyzed later.
Performance analysis demonstrates that our protocol has less computational cost and running time than previous ID-based 2PAKA protocols while providing stronger or the same level of security. For example, considering pre-computation, the running time of our protocol is 77.1% of Bala’s protocol, 36.8% of Ni-I protocol, and 53.8% of Ni-II protocol. In conclusion, our protocol is more applicable for VANETs than other existing protocols.
Outline of the article
The remainder of the article is arranged as below. In section “Preliminaries,” we review several computational problems and essential security attributes required by ID-based AKA protocols. The section “Proposed pairing-free ID-based 2PAKA protocol” describes the eCK model and then presents a pairing-free ID-based 2PAKA protocol. The section “Security analyses” gives a formal proof of the proposed protocol in the eCK model, analyzes essential security attributes that the proposed protocol catches, and compares the security of our protocol with the existing ID-based 2PAKA protocols. The section “Performance analyses” provides the performance analyses and comparisons between the proposed protocol and previous ID-based 2PAKA protocols. Finally, the article concludes in section “Conclusions and future works.”
Preliminaries
This section introduces the preliminaries including several computational problems and essential security attributes required in ID-based AKA protocols.
Computational problems
Let be a q-order cyclic additive group of , and be a generator of . We recall elliptic curve discrete logarithm (ECDL), computational Diffie–Hellman (CDH), Decisional Diffie–Hellman (DDH), and Gap Diffie–Hellman (GDH) problems over the additive group as follows.
Definition 1 (ECDL problem)
Given where unknown , for any probabilistic polynomial time (PPT) algorithm, computing is intractable.
Definition 2 (CDH problem)
For unknown , given , it is infeasible to compute by any PPT algorithm.
Definition 3 (DDH problem)
For unknown , given , it is impossible to determine whether or not in PPT.
Definition 4 (GDH problem)
Given a DDH oracle and where , for any PPT algorithm, the probability of computing is negligible.
Essential security attributes
It is essential for ID-based 2PAKA protocols to satisfy the following security requirements. Suppose that two legal parties A and B run the protocol exactly.
K-SKS. Any session key should not be disclosed when an adversary has known the keys generated in some other sessions.
Forward secrecy (FS). If the long-term secrets of parties are leaked, past session keys should not be compromised. The security property falls into four types:
Partial forward secrecy: Learning some parties’ long-term secrets should not have any influence on the security of the keys in past sessions.
Perfect forward secrecy (PFS). The loss of all the parties’ long-term secrets should not make past session keys known.
Master key forward secrecy (MFS). The past session keys should not be endangered by the leakage of the KGC master private key.
Weak perfect forward secrecy (wPFS). In 2005, Krawczyk52 showed that none of one-round AKA protocols can keep full PFS if the adversary can modify communications between the parties. Thus, one-round AKA protocols can achieve PFS under a passive adversary, which is defined as wPFS.
BIR. An adversary who does not acquire a party A’s long-term secret cannot disguise himself as A.
KCIR. The leakage of party A’s long-term secret cannot enable an adversary to masquerade as any other party to A.
UKSR. It will be prevented that two parties A and B compute the same session key but B deem that the key is negotiated with the adversary E.
NKC. No party can enforce the key in a session to a predetermined value.
ESRR. The compromise of one session’s ephemeral private keys cannot affect the security of the session key.
Proposed pairing-free ID-based 2PAKA protocol
This section first describes the eCK model and then presents a secure pairing-free ID-based one-round 2PAKA protocol for VANETs, which satisfies all the essential security attributes.
Security model
The original eCK model14 was originally proposed for the conventional PKI-based AKA protocols. In order to formalize ID-based AKA protocols, the modified eCK model was presented by Huang and Cao28 and Ni et al.,29 respectively.
Participants
The protocol participants are modeled as a group of parties, in which each party is regarded as a PPT Turing machine. Any two parties can be involved in a run of the protocol. Each party may participate in a polynomial number of sessions at the same time. denotes the sth session of party communicating with intended peer . A session is completed by party when computes a session key.
Adversary model
The adversary is regarded as a PPT Turing machine. The communication link is fully controlled by . That is to say, can possibly eavesdrop, suspend, intercept, replay, modify, and inject messages randomly. The power of the adversary is modeled by allowing it to issue the first six queries in any sequence:
: The adversary has access to the ephemeral private key of party in session .
: The adversary can get the key of a completed session . The session enters an opened state when the adversary makes the query against it.
: The query returns party ’s long-term secret to the adversary .
MasterPrivateKeyReveal: The KGC master private key is revealed to the adversary . MFS can be modeled by the query.
: The adversary may register a lawful user in the name of party and obtains ’s long-term secret by the query. Then party is said to be not honest.
: The query enables the adversary to send the message m to party in the name of party and control to start the session with party . If , party launches the session . Otherwise, if party is an initiator, it only outputs a decision to the session (i.e. accept or reject it); if party is a responder, party selects an ephemeral secret and returns a message and a decision to the session.
: The query can be made to a fresh session only once. A fair coin is flipped. If , the session key is returned to the adversary, otherwise the adversary obtains a selected random value from the distribution of session key.
Definition 5 (matching session)
The session has a matching session when the session is executed by the other party with the same message exchanged, although in different sequence.
Definition 6 (fresh session)
Supposing is a completed session and executed by honest party with honest party , is a fresh session if none of the three cases occur:
Both the session key of and its matching session (if exists) are leaked to the adversary.
has a matching session , and the adversary obtains the long-term and ephemeral secret of party in or the long-term and ephemeral secret of party in .
The matching session of does not exist, and the adversary obtains the long-term and ephemeral secret of party in or the long-term secret of .
In the first stage of the game, the adversary queries the first six oracles in any order. During the second stage, the adversary selects a fresh session (see Definition 6) and makes a query. The game terminates as soon as the adversary outputs a guess for b.
The adversary wins the game when and the test session is still fresh. Assuming k is the security parameter, the advantage of in the game is denoted as
Definition 7 (secure 2PAKA protocols)
A 2PAKA protocol is deemed secure in the eCK model when the protocol satisfies the following two conditions:
Matching sessions executed by two parties, respectively, generate the same session key.
No any PPT adversary has a non-negligible advantage to win the above game.
Remark 1
In ID-based 2PAKA protocols, the shared session key can be computed by using four pieces of secret information: the long-term and ephemeral secrets of two involved parties. The eCK model allows the adversary to query the long-term secrets of two parties, the ephemeral secrets of two parties, or the long-term secret of one party and the ephemeral secret of the other party, but cannot know the long-term and ephemeral secrets of one party.
Protocol description
In our protocol, the trusted authority acts as KGC. Our protocol is composed of the following three parts:
Setup
With the security parameter , the trusted authority (acts as KGC) gets system parameters and its master public/private key pair as below:
Selects a -bit prime number and produces the parameters , where is a cyclic additive group over with the order and is a generator of .
Picks the master private key , and sets as the master public key.
Chooses two cryptographic hash functions and .
Publishes the parameters and keeps s secret.
Extract
Suppose the ID of a vehicle is , the trusted authority computes the long-term private key of the vehicle as below:
Picks randomly , and computes and .
Computes and sets the key pair as the long-term private key of the vehicle.
Return the key pair to the vehicle in a safe manner.
Upon receiving the key pair, the vehicle can validate its correctness by checking if the equation holds. The long-term public key of the vehicle is .
Key agreement
Suppose that vehicle A with ID wishes to agree a key with vehicle B with ID . Figure 1 shows the proposed ID-based two-message 2PAKA protocol that proceeds as follows:
A randomly selects as its ephemeral private key, computes its ephemeral public keys , , and then sends to B
Upon receiving A’s message, B selects at random as its ephemeral private key, calculates its ephemeral public keys , , and then sends to A
A computes and the shared session key .
B computes and the shared session key .
Proposed ID-based two-message 2PAKA protocol for VANETs.
Consistency
The correctness of the protocol is proved as follows
Thus, A and B can get the same session key
Security analyses
This section first proves that the proposed ID-based 2PAKA protocol is secure in the eCK model, and then analyzes the security attributes that the proposed protocol captures.
Security proof
Theorem 1
Assume that GDH problem is intractable and and are random oracles, the protocol proposed in section “Proposed pairing-free ID-based 2PAKA protocol” is said to be secure in the eCK model.
Proof 1
If the two conditions shown in Definition 7 hold, the proposed ID-based 2PAKA protocol is deemed secure in the eCK model. The correctness proof of the protocol guarantees that matching sessions executed by two involved parties, respectively, generate the same session key. Therefore, the first condition holds. Next, we will demonstrate that the second condition also holds. Namely, no any PPT adversary against the protocol can win the game described in section “Security model” with non-negligible probability.
Assume that is the security parameter and the adversary against the protocol succeeds in the game outlined above with non-negligible probability . Suppose that no more than honest parties are activated by the adversary and each party is engaged in at most sessions. Assume that the adversary chooses the Sth protocol session initiated by party communicating with party as the test session in the game. The adversary differentiates between the test session key and a random value only through the following three ways:
Guessing attack: The adversary conjectures the test session key rightly.
Key replication attack: The adversary succeeds in establishing a session, which does not match the test session but possesses the same session key with it. Therefore, can know the test session key by querying the key of the non-matching session.
Forging attack: At some point, queries on in the test session. It is obvious that the adversary computes the value itself.
Since the session key’s size is k bit, the success probability of guessing attack is . If two sessions are not matched, the key derivation function has the same input with probability . Consequently, the first two attacks succeed with negligible probability.
In the following, forging attack is analyzed by employing a reduction approach. A challenger executes the eCK game described in section “Security model” with against the protocol . In the course of the game, the challenger makes a response to all queries of . If the adversary is successful in forging attack with non-negligible probability , the challenger can utilize to solve the GDH problem with non-negligible probability . Given a GDH problem instance where , the challenger ’s task is to compute with the help of a DDH oracle. When the game begins, the challenger ascertains the test session that the adversary selects is with probability greater than . According to the fresh definition in the eCK model, there are two cases that require attention: (1) the matching session of (i.e. ) exists; (2) the test session has no matching session. In the first case, the adversary is passive and faithfully transmits the messages between party and party . In the second case, the challenger also needs to face an active adversary that may alter ’s public key material . Based on the above analysis and the fresh definition, the challenger has to guess the strategy that the adversary adopts from the following six choices:
S1. does not know ’s ephemeral private key and ’s long-term private key, and correctly transmits ’s public key material .
S2. does not know the long-term private keys of and , and correctly transmits ’s public key material .
S3. does not know the ephemeral private keys of and .
S4. does not know ’s long-term private key and ’s ephemeral private key.
S5. does not know ’s ephemeral private key and ’s long-term private key, and the adversary may alter ’s public key material .
S6. does not know the long-term private keys of and , and the adversary may alter ’s public key material .
The success probability that chooses both the test session and the strategy is larger than . Next, we will analyze the six strategies.
S1
does not know ’s ephemeral private key and ’s long-term private key, and correctly transmits ’s public key material .
Setup
The challenger sets the KGC’s master public key and all parties’ long-term keys as follows:
randomly selects a value as the KGC’s master public key.
selects as , computes , and sets as party ’s long-term private key. Therefore, party ’s long-term public key .
picks , computes , sets , and sets as long-term private key of party . Therefore, ’s long-term public key .
For each party , passes to , and inserts the entry to .
Queries
maintains three initially empty lists , , and to handle the , , and SessionKeyReveal queries. responds to the queries issued by as follows:
. After the challenger sets long-term private keys to party , adds the entry to . If an query issued by the adversary matches one entry in the list , returns of the entry to . Otherwise, selects , inserts the entry to , and responds with the randomly chosen value.
. At first, maintains an empty list in which each entry is the form of .
If is already in the list , the challenger returns to .
Otherwise, looks up the matching entry in the list . If the entry exists and , checks if is correctly generated by verifying whether . If is correct, the challenger sets , and stores the new entry to the list . If the entry exists and , the challenger sets , and stores the new entry to the list . Otherwise (no such an entry exists in the list or is not correctly generated), the challenger selects at random and adds the entry to the list .
. selects , computes , sets , and reveals ’s long-term private key to the adversary . totally controls the party .
. If , returns to . Otherwise, aborts.
MasterPrivateKeyReveal. aborts.
. If , aborts. Otherwise, reveals the ephemeral private key to .
. At first, the challenger maintains an empty list in which each entry is the form of .
If and , picks , and then returns and U to .
If and , randomly chooses , chooses as its ephemeral private key, and returns and to the adversary . Then, looks for the matching entry in the list . If the entry exists, checks if is correctly generated by verifying whether . If is correct, the challenger sets , and adds the new entry to the list . Otherwise (no such an entry exists in the list or is not correctly generated), the challenger chooses at random and adds the entry to the list .
If , responds in accordance with the protocol specification.
. If or , aborts. Otherwise, returns the stored value in the list to .
. If , selects and returns it to the adversary . Otherwise, aborts.
Analysis
If the adversary succeeds in forging attack with non-negligible probability, should have made a query to with the input . To settle the problem, verifies whether there is an query issued by on the value , such that . If there is such an query, the challenger solves . correctly computes the GDH problem with the following advantage
S2
does not know the long-term private keys of and , and correctly transmits ’s public key material .
Setup
The challenger sets the KGC’s master public key and all parties’ long-term keys as below:
The challenger selects a value as the KGC’s master public key.
For the party , selects as , computes , and sets as party ’s long-term private key. Therefore, party ’s long-term public key .
For the party , selects as , computes , and sets as party ’s long-term private key. Therefore, party ’s long-term public key .
For any party ( and ), selects , computes , sets , and sets as long-term private key of party . Therefore, party ’s long-term public key .
For each party , passes to , and inserts the entry to .
Queries
maintains three initially empty lists , , and to handle the , , and SessionKeyReveal queries. responds to the queries issued by as follows. Note that answers , , MasterPrivateKeyReveal, , and as it does in S1.
. At first, maintains an empty list in which each entry consists of .
If already exists in , responds to with .
Otherwise, looks for the matching entry in the list . If the entry exists and or , checks if is correctly generated by verifying whether . If is correct, the challenger sets , and stores the new entry to the list . If the entry exists and and , the challenger sets , and stores the new entry to the list . Otherwise (no such an entry exists in the list or is not correctly generated), the challenger randomly chooses and adds the entry to the list .
. If and , returns to . Otherwise, aborts.
. responds to with the ephemeral private key.
. At first, maintains an empty list whose each entry is .
If , the challenger randomly chooses , chooses as its ephemeral private key, and then returns and U to the adversary .
If , the challenger randomly chooses , chooses as its ephemeral private key, and returns and V to the adversary . Then simulates the oracle in the same way as does in S1.
If , the simulation of is similar to that when .
Otherwise, the challenger responds according to the protocol specification.
Analysis
If the adversary is successful in forging attack with non-negligible probability, should have made a query to with the input . To settle the problem, verifies whether there is an query issued by on the value , such that . If there is such an query, calculates . correctly computes the GDH problem with the following advantage
S3
does not know the ephemeral private keys of and .
Setup
The challenger sets the master keys of KGC and all parties’ long-term keys as below:
selects as the master private key of KGC and computes as the master public key of KGC. Therefore, S3 simulates MFS.
picks , computes , sets , and sets as long-term private key of party . Therefore, party ’s long-term public key .
For each party , passes to , and inserts the entry to .
Queries
maintains three initially empty lists , , and to handle the , , and SessionKeyReveal queries. responds to the queries issued by as follows. Note that answers , , , and as it does in S1.
. Originally, maintains an empty list in which each entry is .
If is already in the list , the challenger returns to .
Otherwise, looks up the matching entry in . If the entry exists, the challenger sets , and stores the new entry to the list . Otherwise, the challenger chooses at random and adds the entry to the list .
. returns to .
MasterPrivateKeyReveal. returns s to .
. If or , aborts. Otherwise, reveals the ephemeral private key to .
. At first, maintains an empty list whose each entry is .
If , the challenger randomly chooses , and then returns and U to the adversary .
If , randomly chooses , and returns and V to . Then looks up the matching entry in . If the entry exists, the challenger sets , and adds the new entry to the list . Otherwise, the challenger chooses at random and adds the entry to the list .
Otherwise, the challenger responds according to the protocol specification.
Analysis
If the adversary successfully mounts the forging attack with non-negligible probability, should issue a query to with the input . To solve the problem, verifies whether there is an query issued by on the value , such that . If there is such an query, calculates . successfully solves the GDH problem with the following advantage
S4
does not know ’s long-term private key and ’s ephemeral private key.
For S4, the simulation of is similar to that in S1 (only and are exchanged). The details are omitted. successfully solves the GDH problem with the advantage
S5
does not know ’s ephemeral private key and ’s long-term private key, and the adversary may alter ’s public key material .
Initially, the challenger randomly selects as the KGC’s master public key. Then, sets all parties’ long-term keys as follows. selects , computes , sets , and sets as long-term private key of party . Therefore, party ’s long-term public key . For each party , passes to , and inserts the entry to . Specifically, randomly chooses , and sets the ephemeral public keys of to and . Since is aware of all parties’ long-term private keys, the answers to all queries are easy.
Assume that neither queries nor , and the simulation does not abort. Assume that the session has the incoming message which can possibly be generated by . Here the adversary selects , and may alter ’s public key material . Suppose that selects , and sets . If the adversary is successful in forging attack with non-negligible probability, should make a query to with the input . verifies whether there is an query issued by on the value , such that .
According to the forking lemma,53 replays with the same input and tossing coins. During this run, selects , and sets , where . If the adversary succeeds in forging attack with non-negligible probability, should make a query to with the input . verifies whether there is an query issued by on the value , such that .
To solve the problem, computes , and then computes . Suppose that is the utilization factor of the forking lemma in S5. Consequently, successfully solves the GDH problem with the following advantage
S6
does not know the long-term private keys of and , and the adversary may alter ’s public key material .
Initially, the challenger randomly selects as the KGC’s master public key. Then sets all parties’ long-term keys as follows. For any party , selects , computes , sets , and sets as long-term private key of party . Therefore, party ’s long-term public key . For the party , selects as , computes , and sets as party ’s long-term private key. Therefore, party ’s long-term public key . For each party , passes to , and inserts the entry to . Specifically, randomly chooses , chooses , and sets the ephemeral public keys of to and .
Assume that neither queries nor , and the simulation does not abort. Assume that the session has the incoming message which can possibly be generated by . Here the adversary selects , and may alter ’s public key material . Suppose that selects and sets . If the success probability of the adversary in forging attack is non-negligible, it must have queried with inputs of the form . verifies whether there is an query issued by on the value , such that .
According to the forking lemma, replays with the same input and tossing coins. In the course of this run, selects and sets to , where . If the success probability of the adversary in forging attack is non-negligible, it should make a query to with the input . checks if there is an query issued by on the value , such that .
To solve the problem, computes , and then computes . Suppose that is the utilization factor of the forking lemma in S6. Therefore, successfully solves the GDH problem with the following advantage
For the six strategies, since is assumed to be non-negligible, is also non-negligible. This is in contradiction to the GDH assumption.
The proof of Theorem 1 is complete.□
Security attributes
Our protocol catches all essential security attributes.
K-SKS. The eCK model can cover the K-SKS property because it supports the SessionKeyReveal query. According to the fresh definition, the adversary may reveal the session keys of other sessions than the test session and its matching session (if its matching session exists). The probability that differentiates between the test session key and a random value is negligible. Therefore, the test session key is not disclosed even if has known any other session keys.
FS. Our protocol captures the wPFS and MFS properties. In section “Security proof,” our protocol is proven to be secure in the eCK model. Therefore, the adversary cannot know the long-term and ephemeral secrets of one party, which implies wPFS. Moreover, the proof of S3 guarantees MFS.
BIR. When the long-term secret of party A is not revealed to an adversary , does not know the key of the session of party A with any other party because it cannot calculate the correct input to . Therefore, the adversary cannot impersonate party A.
KCIR. The property is guaranteed by the proofs of S1, S3, S4, and S5. Even when learns the long-term secret of party A and modifies the message sent to party A, it cannot calculate the key of the session of party A with any other party with no knowledge of party A’s ephemeral secret. Therefore, cannot masquerade as any other party to party A. That is to say, the proposed protocol can catch KCIR.
UKSR. Unknown key share (UKS) attack should not be launched successfully in ID-based AKA protocols because the involved parties’ identities are the input of the key derivation function. In addition, a party’s public key is derived from its ID, which also resists UKS attack.
NKC. Because two sessions that are not matched do not have the same input of the key derivation function , the session key cannot be forced to a predetermined value by one involved party or an outside adversary. Moreover, from the security proof, we can know that the adversary cannot differentiate between the test session key and a random value. Thus, our protocol can prevent key control attack.
ESRR. The property is guaranteed by the proofs of all strategies except for S3. The proofs for S1, S4, and S5 guarantee the proposed protocol is secure when ephemeral secrets are revealed partially. The proofs for S2 and S6 guarantee the proposed protocol is secure when ephemeral secrets are disclosed entirely.
Comparisons with the existing protocols
We compare our protocol with other existing ID-based 2PAKA protocols: the most efficient ID-based 2PAKA protocol using pairings (McCullagh-Barreto (MB)-I protocol20), a provably secure ID-based one-round 2PAKA protocol with pairings in the eCK model that catches all essential security attributes (Huang et al.’s28 protocol), and four latest provably secure pairing-free ID-based one-round 2PAKA protocols that catch all essential security attributes (Sun et al.’s46 protocol, Bala et al.’s47 protocol, Ni et al.’s48 protocols; and Islam and Biswas’s49 protocol).
Table 1 shows the comparison results in term of security, in which we only list security model, assumption, and the properties of KCIR and ESRR because these compared protocols catch other basic desirable security properties including K-SKS, wPFS, BIR, UKSR, and NKC. “√” and “×” mean that the security property is captured and is not captured by the protocol, respectively. “” is used to denote the eCK model that does not take active adversaries into account. From Table 1, it is clear that Huang and Cao’s28 protocol, Sun et al.’s46 protocol, and Bala et al.’s47 protocol do not consider active adversaries although they are given the security proofs in strong model such as eCK model. In addition, the security analysis based on BAN logic model does not make certain that Islam and Biswas’s49 protocol is secure.51 Therefore, among these compared ID-based 2PAKA protocols, only Ni-I,48 Ni-II,48 and our protocol are proven secure under the passive and active adversaries in the eCK model. It can be concluded that Ni et al.’s48 protocols and our protocol achieve higher security than the five protocols.20,28,46,47,49
In this section, the efficiency of our protocol is compared with the existing protocols in terms of message size, computational cost, and running time. We omit the communication round because these compared protocols all have one-round communication. We implement the cryptographic operations by using MIRACL,54 a standard cryptographic library. Since a vehicle has unlimited computation ability and power in VANETs,55 the hardware platform that we select is an Intel Core 2 E8400 processor with 2 GB memory and a Windows XP operation system. For the two protocols using pairings,20,28 to provide the 80-bit security level, we choose the Tate pairing on the elliptic curve over p with embedding degree 2, where q is a 160-bit prime and p is a 512-bit prime meeting the condition of . As for the pairing-free protocols,46–49 to reach the same level of security, we employ the group on elliptic curve cryptography (ECC) secp160r1. The cryptographic operating times are shown in Table 2 where Exponent. in mult.group and poi.mult. stands for exponentiation in a multiplicative group and point multiplication, respectively.
Cryptographic Operating Time (in milliseconds).
Pairing
Exponent. in mult.group
Pairing-based poi.mult.
ECC-based poi.mult.
18.32
5.30
5.54
2.01
Table 3 lists the comparison results in terms of message size, computational cost, and running time. Assume that one user ID is 2 bytes long. Our protocol’s exchanged message is one ID and three points, and thus the message size is . In Bala et al.’s47 protocol, the exchanged message comprises one ID and two points, and thus the message size is . Similarly, the message sizes of other compared protocols can be given.
Performance comparison of ID-based 2PAKA protocols (using pre-computation).
In the comparison of the computational cost, for simplicity, we only consider the expensive operations including pairing operation, exponentiation in a multiplicative group, pairing-based point multiplication, and ECC-based point multiplication, which are denoted as P, E, PM, and EM, respectively. The values in parentheses are the computational costs of these protocols when pre-computation is considered.
The running time of an AKA protocol is approximately equal to the computation time of one party and the transmission times of two exchanged messages in wireless links. In vehicular environments, the time spent on one message transmission is the sum of transmission times of the physical layer convergence procedure (PLCP) preamble (i.e. ), the SIGNAL field (i.e. ), and DATA field. The DATA field consists of the 16-bit SERVICE field, the physical service data unit (PSDU) (i.e. the medium-access control (MAC) frame), the 6-bit TAIL field, and the PAD field. The length of PAD field satisfies the condition that the number of bits in the DATA field should be a multiple of the number of data bits per orthogonal frequency division multiplexing (OFDM) symbol. According to 802.1156 and dedicated short-range communications (DSRC) standards,57 the data rate varies from 3 to 27 Mbps. In addition, the network and transport layers, Wave Short Message (WSM) header is at least 5 bytes in length, and subnetwork access protocol (SNAP) header and the logical link control (LLC) sublayer header are 5 and 3 bytes in length, respectively. The MAC sublayer header is 28 bytes in length. In order to better reflect the performation advantages of our protocol, the minimum data rate (i.e. 3 Mbps) and the corresponding number of data bits per OFDM symbol (i.e. 24 data bits) are chosen to compute the running time of compared protocols. Accordingly, the running time of our protocol can be computed as follows: 2EM + 2 (the transmission time of PLCP preamble + the transmission time of SIGNAL + (PSDU + TAIL + PAD) / (data rate)) = 4.676 ms. Similiarly, the running times of other compared protocols are listed in Table 3.
As listed in Table 3, it is clear that the ID-based pairing-free 2PAKA protocols achieve much better performance than the ID-based 2PAKA protocols using pairings. In addition, it is found that our protocol is superior to Ni-I48 protocol and Ni-II48 protocol in terms of computational cost and running time while having the same message size as them. Specifically, the running time of our protocol is 36.8% of Ni-I protocol, 53.8% of Ni-II protocol when pre-computation is considered. From Table 3, we can observe that our protocol is computationally more efficient than Bala et al.’s47 protocol considering pre-computation with the disadvantage of slightly increased message size. The reason is that, (1) the intended partner vehicles communicating with vehicle A are not the same in different sessions of vehicle A; (2) in our protocol, and are suitable for pre-computation as these two values have nothing to do with other parties and party A only needs to store two points; (3) in Bala’s protocol, vehicle A is not suitable to pre-compute and store for large numbers of unpredictable vehicles due to the rapid topology changes nature of vehicular networks. Therefore, Bala et al.’s47 protocol and our protocol require three and two ECC-based point multiplication operations, respectively, when pre-computation is carried out. Moreover, the security proof of Bala et al.’s47 protocol does not take active adversaries into account. Although the message size of our protocol is one point more than that of Bala’s protocol, our protocol has less running time than Bala’s protocol. Namely, the running time of our protocol is 77.1% of that of Bala’s protocol. Figure 2 illustrates the comparison result of Bala et al.’s47 protocol, Ni-I,48 Ni-II,48 and our protocol in terms of running time when pre-computation is carried out.
Comparison result of the running time (with pre-computation).
To summarize, our protocol has better performance than previous ID-based protocols while achieving higher or the same security level. It is concluded that our protocol is more suitable to real-time application environments with highly dynamic topology such as VANETs than the existing ID-based 2PAKA protocols.
Discussion
The proposed 2PAKA protocol enables two authentic vehicles to agree on a shared session key, which can be used for secure communication. For example, the secure communication protocol for VANETs58 achieves the multi-level conditional privacy preservation authentication and integrity of transmitted messages based on ring signature. However, the signature is generated by using the private key of sender and L collected public keys, and the transmitted message consists of payload, timestamp, signature, and L public keys. Therefore, the message size is a little long and the signature verification requires 2 × L + 3 time-consuming pairing operations. The secure communication protocol for VANETs2 offers the confidentiality, conditional privacy preservation authentication, and integrity of transmitted messages based on group signcryption. The session key used for signcryption is derived from the group secret key, which is generated by the group secret key agreement. However, the group secret key and group public key need to be updated on all unrevoked vehicles each time a member is revoked or quits the group. In addition, the group-based communication protocols for VANETs2,58 are only suitable for the application scenarios with low mobility and little topology changing, such as traffic jam, urban road, and parking lot. Therefore, the article focuses on 2PAKA for VANETs.
Conclusions and future works
This article presents a provably secure and efficient one-round ID-based 2PAKA protocol without pairings for VANETs. The proposed protocol is given the formal proof under the passive and active adversaries in the eCK model. We also analyze that the proposed protocol can capture all essential security properties including K-SKS, wPFS, MFS, BIR, KCIR, UKSR, NKC, ESRR, and so on. The proposed protocol outperforms the existing ID-based 2PAKA protocols in terms of computational cost and running time while providing higher or the same level of security. In particular, if pre-computation is considered, our protocol reduces the running time to 77.1% of Bala’s protocol, 36.8% of Ni-I protocol, and 53.8% of Ni-II protocol while providing stronger or the same security level. As a result, our protocol is more applicable than other existing ID-based 2PAKA protocols for real-time application environments with quickly changing topology such as VANETs. Our future work is to present a provably secure and efficient certificateless 2PAKA protocol without pairings.
Footnotes
Handling Editor: Daniel Gutierrez-Reina
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the National Natural Science Foundation of China (NSFC) (grant number 61402351), the Fundamental Research Funds for the Central Universities (grant number JB140116), and the Programme of Introducing Talents of Discipline to Universities (111 Project) (grant numbers B16037, B08038).
References
1.
BüttnerCBartelsFHussS. Real-world evaluation of an anonymous authenticated key agreement protocol for vehicular ad-hoc networks. In: 2015 IEEE 11th international conference on wireless and mobile computing, networking and communications (WiMob), Abu Dhabi, United Arab Emirates, 19–21 October 2015, pp.651–658. New York: IEEE.
2.
XiongHZhuGChenZet al. Efficient communication scheme with confidentiality and privacy for vehicular networks. Comput Electr Eng2013; 39(6): 1717–1725.
3.
ZhangL. OTIBAAGKA: a new security tool for cryptographic mix-zone establishment in vehicular ad hoc networks. IEEE T Inf Foren Sec2017; 12(12): 2998–3010.
4.
ZhangLWuQDomingo-FerrerJet al. Distributed aggregate privacy-preserving authentication in VANETs. IEEE T Intell Transp2017; 18(3): 516–526.
5.
ZhangLHuCWuQet al. Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE T Comput2016; 65(8): 2562–2574.
6.
ZhangLMengXRaymond ChooK-Ket al. Privacy-preserving cloud establishment and data dissemination scheme for vehicular cloud. IEEE T Depend Secure2018; 99: 1–1.
7.
BellareMRogawayP. Entity authentication and key distribution. In: StinsonDR (ed.) Advances in cryptology—CRYPTO’93, LNCS 773. Berlin: Springer-Verlag, pp.232–249.
8.
BellareMRogawayP. Provably secure session key distribution: the three party case. In: Proceedings of the 27th annual ACM STOC, Las Vegas, NV, 29 May–1 June 1995, pp.57–66. New York: ACM.
9.
Blake-WilsonSJohnsonDMenezesA. Key agreement protocols and their security analysis. In: DarnellM (ed.) International conference on cryptography and coding, LNCS 1355. Berlin: Springer-Verlag, pp.30–45.
10.
Blake-WilsonSMenezesA. Entity authentication and authenticated key transport protocols employing asymmetric techniques. In: ChristiansonBCrispoBLomasMet al. (eds) International workshop on security protocols, LNCS 1361. Berlin: Springer-Verlag, pp.137–158.
11.
BellareMPointchevalDRogawayP. Authenticated key exchange secure against dictionary attacks. In:PreneelB (ed.) Advances in cryptology—EUROCRYPT 2000, LNCS 1807. Berlin: Springer-Verlag, pp.139–155.
12.
CanettiRKrawczykH. Analysis of key-exchange protocols and their use for building secure channels. In: PfitzmannB (ed.) Advances in cryptology—EUROCRYPT 2001, LNCS 2045. Berlin: Springer-Verlag, pp.453–474.
LaMacchiaBLauterKMityaginA. Stronger security of authenticated key exchange. In: SusiloWLiuJKMuY (eds) International conference on provable security, LNCS 4784. Berlin: Springer-Verlag, pp.1–16.
15.
SmartNP. Identity based authenticated key agreement protocol based on the Weil pairing. Electron Lett2002; 38(13): 630–632.
16.
ChenLKudlaC. Identity based authenticated key agreement protocols from pairings. In: Proceedings of the 16th IEEE computer security foundations workshop, Pacific Grove, CA, 30 June–2 July 2003, pp.219–233. New York: IEEE.
17.
ShimK. Efficient ID-based authenticated key agreement protocol based on Weil pairing. Electron Lett2003; 39(8): 653–654.
18.
SunHHsiehB. Security analysis of Shim’s authenticated key agreement protocols from pairings. Cryptology ePrint Archive, Report 2003/113, 2003, http://eprint.iacr.org/2003/113/
19.
RyuEYoonEYooK. An efficient ID-based authenticated key agreement protocol from pairings. In: MitrouNKontovasilisKRouskasGNet al. (eds) Proceedings of the networking ’04, LNCS 3042. Berlin: Springer-Verlag, pp.1458–1463.
20.
McCullaghNBarretoP. A new two-party identity-based authenticated key agreement. In: MenezesA (ed.) Topics in cryptology—CT-RSA 2005, LNCS 3376. Berlin: Springer-Verlag, pp.262–274.
21.
XieG. Cryptanalysis of Noel McCullagh and Paulo S.L.M. Barreto’s two-party identity-based key agreement. Cryptology ePrint Archive, Report 2004/308, 2004, http://eprint.iacr.org/2004/308/
ChoieYJJeongELeeE. Efficient identity-based authenticated key agreement protocol from pairings. Appl Math Comput2005; 162(1): 179–188.
24.
YuanQLiS. A new efficient ID-based authenticated key agreement protocol. Cryptology ePrint Archive, Report 2005/309, 2005, http://eprint.iacr.org/2005/309/
25.
ChenLChengZSmartNP. Identity-based key agreement protocols from pairings. Int J Inf Secur2007; 6(4): 213–241.
26.
WangSCaoZCaoF. Efficient identity-based authenticated key agreement protocol with PKG Forward Secrecy. Int J Netw Sec2008; 7(2): 181–186.
27.
WangSCaoZChooKet al. An improved identity-based key agreement protocol and its security proof. Inform Sciences2009; 179(3): 307–318.
28.
HuangHCaoZ. An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. In: Proceeding of the ACM ASIACCS 2009, Sydney, NSW, Australia, 10–12 May 2009, pp.333–342. New York: ACM.
ZhangJWuZLiY. An improved identity-based authenticated key agreement protocol using pairings. In: International conference on computer science and network technology, Harbin, China, 24–26 December 2011, pp.45–49. New York: IEEE.
31.
HölblMWelzerTBrumenB. An improved two-party identity-based authenticated key agreement protocol using pairings. J Comput Syst Sci2012; 78(1): 142–150.
32.
NiLChenGLiJ. Escrowable identity-based authenticated key agreement protocol with strong security. Comput Math Appl2013; 65(9): 1339–1349.
33.
NiLChenGLiJet al. Strongly secure identity-based authenticated key agreement protocols in the escrow mode. Sci China Inform Sci2013; 56(8): 1–14.
34.
ShamirA. Identity-based cryptosystems and signature schemes. In: BlakleyGRChaumD (eds) Advances in cryptology—EUROCRYPT 1984, LNCS 196. Berlin: Springer-Verlag, pp.47–53.
35.
CaoXKouWDuX. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inform Sciences2010; 180(15): 2895–2903.
36.
AranhaDFaz-HernándezALópezJet al. Faster implementation of scalar multiplication on Koblitz curves. In: HeviaANevenG (eds) International conference on cryptology and information security in Latin America, LNCS 7533. Berlin: Springer-Verlag, pp.177–193.
37.
ZhuRYangGWongD. An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. Theor Comput Sci2007; 378(2): 198–207.
38.
CaoXKouWYuYet al. Identity-based authentication key agreement protocols without bilinear pairings. IEICE T Fund Electr2008; 91(12): 3833–3836.
39.
FioreDGennaroR. Making the Diffie-Hellman protocol identity-based. In: PieprzykJ (ed.) Topics in cryptology—CT-RSA 2010, LNCS 5985. Berlin: Springer-Verlag, pp.165–178.
40.
HouMXuQ. An efficient and secure one-round authenticated key agreement protocol without pairings. In: 2011 international conference on multimedia technology, Taipei, Taiwan, 28–30 March 2005, pp.160–163. New York: IEEE.
41.
HouMXuQ. A one-round ID-based authenticated key agreement protocol with enhanced security. In: 2011 2nd international conference on intelligent control and information processing, Harbin, China, 25–28 July 2011, pp.194–197. New York: IEEE.
42.
IslamSHBiswasGP. An improved pairing-free identity-based authenticated key agreement protocol based on ECC. Procedia Engineer2012; 30: 499–507.
VivekSSelviSVenkatesanLet al. Efficient, pairing-free, authenticated identity based key agreement in a single round. In: SusiloWReyhanitabarR (eds) International conference on provable security, LNCS 8209. Berlin: Springer-Verlag, pp.38–58.
45.
GhoreishiSMIsninIRazakSet al. A novel secure two-party identity-based authenticated key agreement protocol without bilinear pairings. In: AbrahamAMudaAChooYH (eds) Pattern analysis, intelligent security and the Internet of Things, AISC 355. Cham: Springer-Verlag, pp.287–294.
46.
SunHWenQZhangHet al. A strongly secure identity based authenticated key agreement protocol without pairings under the GDH assumption. Secur Commun Netw2015; 8(17): 3167–3179.
IslamSHBiswasGP. A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication. J King Saud Univ: Comput Inform Sci2017; 29(1): 63–73.
50.
BonehDFranklinM. Identity-based encryption from the Weil pairing. In: KilianJ (ed.) Advances in cryptology—CRYPTO 2001, LNCS 2139. Berlin: Springer-Verlag, pp.213–229.
51.
ChengZNistazakisMComleyRet al. On the indistinguishability-based security model of key agreement protocols in simple cases. Cryptology ePrint Archive, Report 2005/300, 2005, http://eprint.iacr.org/2005/300/
52.
KrawczykH. HMQV: a high-performance secure Diffie-Hellman protocol. In: ShoupV (ed.) Advances in cryptology—CRYPTO 2005, LNCS 3621. Berlin: Springer-Verlag, pp.546–566.
53.
PointchevalDSternJ. Security arguments for digital signatures and blind signatures. J Cryptol2000; 13(3): 361–396.
LiCTHwangMSChuYP. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput Commun2008; 31(12): 2803–2814.
56.
IEEE 802.11-2016:2016. IEEE Standard for Information Technology —telecommunications and information exchange between systems local and metropolitan area networks—specific requirements—part 11: wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications.
57.
KenneyJ. Dedicated Short-Range Communications (DSRC) Standards in the United States. Proc IEEE2011; 99(7): 1162–1182.
58.
XiongHChenZLiF. Efficient and multi-level privacy-preserving communication protocol for VANET. Comput Electr Eng2012; 38(3): 573–581.