Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2025 Sep 2;25(17):5441. doi: 10.3390/s25175441

ECACS: An Enhanced Certificateless Authentication Scheme for Smart Car Sharing

Zhuowei Shen 1,2,*,, Xiao Kou 1, Taiyao Yang 1
Editors: Peter Han Joo Chong, Guanding Yu
PMCID: PMC12431318  PMID: 40942869

Abstract

Driven by the demand for cost-effective vehicle access, enhanced flexibility, and sustainable transportation practices, smart car-sharing has emerged as a prominent alternative to traditional vehicle rental systems. Leveraging the Internet of Vehicles (IoV) and wireless communication, these systems feature dynamic renter-vehicle mappings, enabling users to access any available vehicle rather than being restricted to a specific one pre-assigned by the service provider. However, many existing schemes in the IoV field conflate users and vehicles, complicating the identification and tracking of the vehicle’s actual driver. Moreover, most current authentication protocols rely on a strict, initial binding between a user and a vehicle, rendering them unsuitable for the dynamic nature of car-sharing environments. To address these challenges, we propose an enhanced certificateless signature scheme tailored for smart car-sharing. By employing a biometric fuzzy extractor and the Chinese Remainder Theorem, our scheme provides a fine-grained authentication mechanism that eliminates the need for local computations on the user’s side, meaning users do not require a smartphone or other digital device. Furthermore, our scheme introduces category identifiers to facilitate vehicle selection based on specific classes within car-sharing contexts. A formal security analysis demonstrates that our scheme is existentially unforgeable against adversaries under the random oracle model. Finally, a comprehensive evaluation shows that our proposed scheme achieves competitive performance in terms of computational and communication overhead while offering enhanced practical functionalities.

Keywords: car-sharing, certificateless signature, internet of vehicles, authentication

1. Introduction

The widespread adoption of digital technologies and the development of the Internet of Vehicles (IoV) are driving the transformation of the automotive sector toward intelligent systems [1]. For instance, connected vehicles exchange real-time traffic information through vehicle-to-vehicle communication, while smart parking systems leverage positional data to optimize space allocation. Furthermore, within the framework of intelligent transportation systems, all automotive entities can contribute to optimizing traffic flow and enhancing overall transportation efficiency through global monitoring and data analytics [2,3]. In recent years, driven by the growing demand for cost-effective mobility, smart car-sharing has gained significant traction as an alternative to traditional vehicle rental services [4]. According to a report by Statista Market Insights, global car-sharing revenue is projected to reach approximately USD 13.89 billion in 2025 and is forecast to grow at a compound annual growth rate (CAGR) of 3.23% over the subsequent five-year period [5].

Traditional car rental services require users to book a specific vehicle in advance and retrieve it from a designated depot, a process that is often time-consuming and inconvenient. In contrast, smart car-sharing providers (e.g., Zipcar, Car2Go) offer a more flexible alternative. As illustrated in Figure 1, a typical smart car-sharing workflow begins with vehicles being classified into categories based on their characteristics (e.g., model, capacity) and registered with the service center. After completing registration and payment, users can select any available vehicle within a category that meets their requirements. This model allows individuals to use vehicles on demand, thereby avoiding the costs and responsibilities associated with private car ownership, such as maintenance expenses [6]. Furthermore, compared with public transportation and conventional car rentals, smart car-sharing provides greater flexibility in travel time and destination, as well as more convenient vehicle access [7].

Figure 1.

Figure 1

A general scenario of smart car-sharing.

Despite these benefits, communication in IoV environments relies on wireless channels, which are inherently insecure and susceptible to malicious attacks. Consequently, various authentication schemes [8,9,10] have been proposed for the IoV domain to safeguard against threats such as replay [11] and forgery attacks [12]. However, a prevalent limitation of these protocols is their static binding of users to vehicles, which effectively treats the pair as an inseparable entity. This approach is ill-suited for dynamic car-sharing environments. For instance, when malicious behavior occurs, traditional schemes can typically only identify the specific vehicle involved, not the driver. As a result, preventing the malicious user from accessing other vehicles is a challenging and delayed process, as existing authentication protocols incorporate vehicle-specific, rather than user-specific, information in their computations. In a system characterized by rapid user turnover, this oversight creates a significant security vulnerability.

Furthermore, the high turnover of renters for a single vehicle necessitates schemes with dynamic membership management capabilities. Various approaches have been proposed to achieve this functionality, including the use of area keys [13] and Merkle Hash Trees (MHTs) [14]. However, the former approach is computationally expensive due to the need for individual calculations per user, while the latter incurs significant storage overhead because of the hierarchical structure of hash trees. In contrast, the Chinese Remainder Theorem (CRT) enables efficient and lightweight membership management by maintaining and distributing a global shared secret value through broadcasting, demonstrating advantages in both computational efficiency and storage overhead [15]. Nevertheless, current applications of CRT in the IoV field primarily focus on vehicle-side applications. These implementations often require users to perform computations on their personal digital devices, such as smartphones, which can be impractical or inconvenient for renters in real-world scenarios.

In response to the aforementioned challenges, we propose an enhanced CLS scheme that introduces a fine-grained and user-vehicle decoupled authentication mechanism for smart car-sharing scenarios. Specifically, our scheme employs the fuzzy extractor to securely incorporate user biometric information into the authentication process while eliminating the need for user-side computation. Once a user completes the login procedure, the corresponding vehicle generates a signature embedded with a biometric-derived secret, thereby enhancing authenticity by jointly verifying both the user and the vehicle. Additionally, vehicles within the system are classified into categories, with each assigned a unique identifier. This process enables legitimate users to select and access any available vehicle within their chosen category. Furthermore, we integrate the CRT with user-extracted biometric secrets and facilitate the dynamic revocation of renters in cases of service expiration or malicious behavior. The key contributions of the article are outlined as follows:

  • (1)

    We propose an efficient CLS authentication scheme for smart car-sharing scenarios, built upon the fuzzy extractor and the CRT. Compared with existing authentication schemes, our scheme provides decoupled, fine-grained authentication, supports dynamic user revocation, and eliminates computation on the user side.

  • (2)

    We introduce a novel category-range authentication framework where vehicles are organized into distinct categories with unique identifiers. This enables users to access any vehicle within an authorized category, instead of a single specific one in most IoV frameworks, thereby enhancing the flexibility and efficiency of the rental process.

  • (3)

    We conduct a comprehensive security analysis of our scheme and benchmark its performance against related works. The results demonstrate that our proposal achieves provable security and exhibits competitive overhead in terms of computation, communication, and dynamic membership management.

The remainder of this article is structured as follows: Section 2 reviews the existing related works relevant to our proposed scheme. Section 3 introduces the preliminaries, as well as our system and security models. Section 4 elaborates on the details of our proposed scheme. Subsequently, Section 5 presents the formal security analysis and discusses the security properties of our scheme. In Section 6, we evaluate the performance of our proposed scheme and compare it with other existing schemes. Finally, Section 7 concludes the article.

2. Related Works

Digital signature schemes have been widely adopted in the IoV to secure communication processes. In early approaches based on Public Key Infrastructure (PKI) [16,17], certificates and the corresponding public–private key pairs of the vehicles are issued by a trusted certificate authority (CA). Although the implementation of PKI systems enhances the security level of these schemes, the resource-intensive certificate management process remains a significant concern. To mitigate this issue, subsequent protocols leveraged Identity-Based Cryptography (IBC), which eliminates certificate management overhead by employing a trusted Private Key Generator (PKG) to derive public keys directly from identities [18,19,20]. However, the implementation of PKG also introduces the key escrow problem, which can lead to sensitive information exposure and faulty authentication if the PKG in the scheme is compromised and no longer trusted.

To address the key escrow problem, Al-Riyami and Paterson proposed the concept of certificateless public key cryptography (CL-PKC) [21]. By replacing PKG with a semi-trusted key generation center (KGC) and incorporating random numbers selected by users themselves in the key generation process, certificateless signature (CLS) schemes achieve private key confidentiality, as KGC cannot acquire the complete private key of the participants [22].

Built on the framework of CL-PKC, numerous CLS schemes with varying characteristics have been proposed. For instance, Malip et al. [23] proposed a certificateless anonymous authentication scheme designed to facilitate secure message transmission. Zhong et al. [24] introduced a certificateless aggregate signature scheme (CLAS) incorporating pseudonyms to achieve message authentication and conditional privacy preservation. Wang et al. [25] proposed a novel certificateless authentication scheme and demonstrated its security within the standard model. However, the scheme proposed by Wang et al. was subsequently proven to be insecure [26]. Furthermore, the aforementioned schemes are all based on bilinear mapping, which is computationally intensive, raising significant concerns regarding their efficiency.

To reduce the computational overhead associated with bilinear pairings, schemes based on elliptic curve cryptography (ECC) have been widely proposed [27,28,29,30,31,32]. Ali et al. [33] proposed a certificateless authentication scheme utilizing map-to-point hash functions and short signatures. However, Li et al. [34] later identified that the scheme proposed in [33] is vulnerable against Type-II adversaries and subsequently contributed a new reliable CLAS scheme for VANET. Aiming to solve the weakness of the potential side channel attacks against tamper-proof devices, Xiong et al. [35] proposed a double insurance CLS scheme. Unfortunately, Shim [26] later demonstrated that Xiong’s scheme is susceptible to forgery attacks. Following this, Gong et al. [36] introduced a certificateless authentication protocol, asserting its robustness against both Type-I and Type-II adversaries while claiming superiority over prior schemes in [35,37]. Nevertheless, Wu et al. [38] recently concluded that the scheme by Gong et al. [36] also fails to achieve the claimed resistance against forgery attacks by Type-I adversaries. Crucially, in IoV-based car-sharing scenarios, these schemes focus solely on inter-vehicle authentication while neglecting the essential granular authentications required between users and vehicles, thereby rendering them impractical for dynamic car-sharing applications.

In recent years, numerous schemes have sought to enhance the flexibility of users in IoV by incorporating techniques such as passwords and biometric information [39,40]. Islam et al. [41] proposed a password-based authentication protocol for VANETs that supports the dynamic changes in vehicle membership. Later, Cui et al. [42] introduced an authentication scheme based on the Chebyshev chaotic map, incorporating fuzzy verification and honeywords for rescue scenarios. Regarding the application of biometric information, Azees et al. [43] proposed a hybrid CMOS memristor-based authentication scheme employing bilinear operations, ensuring that only registered users can interact with the vehicle. Wang et al. [44] integrated distance calculation into the biometric authentication process and proposed a fuzzy CLS scheme. Despite these advancements, existing approaches maintain a rigid binding between users and vehicles, preventing users from accessing vehicles beyond their specifically assigned ones. Meanwhile, in smart car-sharing scenarios, it is crucial for service providers to allow renters to access vehicles at their convenience.

A comparative summary of existing schemes is presented in Table 1. The limitations identified therein highlight the need for a practical authentication scheme that decouples users from specific vehicles, thereby better addressing the operational requirements of real-world car-sharing services.

Table 1.

Comparative summary of the existing schemes.

Scheme Technologies Unforgeability GA a DB b
[33] ECC, Short signature Type II weak
[34] ECC, Registration-based encryption
[35] ECC, Private key double insurance Type I weak
[36] ECC, Pseudonym mechanism, Low resource consumption Type I weak
[41] ECC, Password-based auth., Vehicle membership alteration
[42] Chebyshev chaotic map, Fuzzy verification, Honeywords
[43] Bilinear mapping, CMOS memristor-based auth.
[44] ECC, Fuzzy extractor, Biometric-based auth.

✔: The scheme satisfies the feature. ✕: The scheme does not satisfy the feature. a GA: Granular authentication. b DB: Dynamic binding.

3. Preliminaries

In this section, we first provide a concise background explanation of elliptic curve cryptography and the Chinese Remainder Theorem. Then, we introduce the system and security models of our proposed authentication scheme. The symbols used in our scheme are described in Table 2.

Table 2.

Symbols and definitions.

Symbol Definition
λ Security parameter
TA Trust Authority
KGC Key generation center
SVi Sharing vehicle
Userj User
s Secret key of KGC
t Secret key of TA
params System parameters
VIDi Identity of the vehicle
PVIDi Pseudonym of the vehicle
UIDj Identity of the user
PIDj Pseudonym of the user
PKi Public key of the vehicle
ski Private key of the vehicle
dj Private key of the user
gidi,GIDi Category identifier
z Group identifier
σ Signature
pj Identifier update secret
T{i,j,z,l,m,r} Timestamp

3.1. Elliptic Curve Cryptography

In the ECC system, an elliptic curve E is defined by the equation y2=x3+ax+bmodp over Fp, where Fp is a finite field defined on a large prime number p. Here, a,bFp, satisfying the condition 4a3+27b2modp0. Furthermore, let O represent a point at infinity; then an additive elliptic curve group G with order q and the generator P can be defined with O and the points on E.

Elliptic Curve Discrete Logarithm Problem (ECDLP): Given the instance (P,aP), where aZq and PG, it is computationally infeasible to obtain a from aP in probabilistic polynomial time.

3.2. Chinese Remainder Theorem

Let m1,m2,,mn be pairwise coprime positive integers, and let a1,a2,,an denote arbitrary integers. Then, the system

xa1(modm1)xa2(modm2)xan(modmn)

has a unique solution modulo N=i=1nmi. Specifically, the solution can be expressed as xi=1nai×αi×βimodN, where αi=Nmi and αi×βi1modmi.

3.3. System Model

In our proposed scheme, four main participants are involved, namely the TA (trust authority), the KGC (key generation center), the SV (sharing vehicle), and the users.

  1. TA: It represents the service center in smart car-sharing, which is a fully trusted authority that generates the system parameters and manages the service membership of users within the system by distributing and updating the group identifier. Moreover, it is also responsible for generating pseudonyms for users and can track and reveal their real identities when malicious behaviors occur.

  2. KGC: It represents a key generation center that generates the partial private keys for vehicles and the private keys for users and is considered to be a semi-trusted third party.

  3. SV: It represents a vehicle in the car-sharing service. In our scheme, SVs are classified into individual categories based on their characteristics (e.g., model and capacity). After an SV is logged in by a legitimate renter via biometric information, it can authenticate with other verified SVs by generating signatures utilizing the derived group identifier.

  4. User: It represents the actual user of the car-sharing service. Additionally, it is important to emphasize that no local computational abilities are required for users in our proposed scheme.

The system model of our proposed scheme is demonstrated in Figure 2. Initially, SVs register with KGC to obtain their partial private keys and category identifiers. Subsequently, users complete the registration process by submitting biometric information to TA. When a legitimate user requires access to a vehicle, they may access any vehicle that shares the same category identifier selected during user registration. Upon successful user login, the vehicle can generate signatures to enable secure authentication with other accessed vehicles. In the event that a malicious user is detected, TA will update the group identifier and broadcast the auxiliary information to process revocation, and legitimate vehicles can obtain the updated group identifier using their identifier update secrets derived from the users.

Figure 2.

Figure 2

The system model of the proposed scheme.

3.4. Security Model

In the field of CLS schemes, two types of attacks are often considered, namely Type-I attacks launched by external adversaries and Type-II attacks launched by internal adversaries [45]. In a Type-I attack, an adversary is able to launch public key replacement attacks but cannot gain access to the master secret key. In contrast, in a Type-II attack, an adversary can acquire the system’s master secret key but cannot replace the public key of any entity.

To demonstrate the security of our proposed scheme, we will prove its existential unforgeability against chosen-message attacks (EUF-CMA). This proof is based on two challenge-response games, each formalizing one of the aforementioned attack scenarios.

Game I: This game is performed by a Type-I adversary A1 and the challenger C. The details are as follows:

Setup: C runs Setup to generate its master secret key s and the system parameters params. Then it sends params to A1 and keeps s secret.

Queries: In this phase, A1 can adaptively access the following queries.

  • (1)

    Vehicle Registration Query: When receiving this query from A1 with PVIDi as input, C generates the related information for the corresponding vehicle.

  • (2)

    User Registration Query: When receiving this query from A1 with PIDj as input, C generates the related information for the corresponding user.

  • (3)

    Reveal Vehicle Partial Key Query: When receiving this query from A1 with PVIDi as input, C returns the corresponding di.

  • (4)

    Reveal User Private Key Query: When receiving this query from A1 with PIDj as input, C returns the corresponding dj.

  • (5)

    Reveal Vehicle Secret Query: When receiving this query from A1 with PVIDi as input, C returns the corresponding xi.

  • (6)

    Reveal Vehicle Public Key Query: When receiving this query from A1 with PVIDj as input, C returns the corresponding (Xi,Ri).

  • (7)

    Reveal User Public Key Query: When receiving this query from A1 with PIDj as input, C returns the corresponding Rj.

  • (8)

    Replace Vehicle Public Key Query: When receiving this query from A1 with (PVIDi,Xi,Ri) as input, C replaces the public key of the corresponding vehicle with Xi,Ri.

  • (9)

    Replace User Public Key Query: When receiving this query from A1 with (PIDj,Rj) as input, C replaces the public key of the corresponding user with Rj.

  • (10)

    Sign Query: When receiving this query from A1 with (PVIDi,PIDj,mi) as input, C outputs a legitimate signature σi.

Forgery: In this phase, A1 outputs a signature σ for the tuple (PVIDi,PID,m), and A1 wins in this game if the following conditions are satisfied.

  • Sign Query has never been queried with the submitted tuple.

  • Reveal User Private Key Query and Replace User Public Key Query have never been queried with the pseudonym PID by A1.

  • σ is a valid signature for the submitted tuple.

Game II: This game is performed by a Type-II adversary A2 and the challenger C. The details are as follows:

Setup: C runs Setup to generate its master secret key s and the system parameters params. Then it sends params and s to A2.

Queries: In this phase, A2 can adaptively access the following queries.

  • (1)

    Vehicle Registration Query: When receiving this query from A2 with PVIDi as input, C generates the related information for the corresponding vehicle.

  • (2)

    User Registration Query: When receiving this query from A2 with PIDj as input, C generates the related information for the corresponding user.

  • (3)

    Reveal User Private Key Query: When receiving this query from A2 with PIDj as input, C returns the corresponding dj.

  • (4)

    Reveal Vehicle Secret Query: When receiving this query from A2 with PVIDi as input, C returns the corresponding xi.

  • (5)

    Reveal Vehicle Public Key Query: When receiving this query from A2 with PVIDj as input, C returns the corresponding (Xi,Ri).

  • (6)

    Reveal User Public Key Query: When receiving this query from A2 with PIDj as input, C returns the corresponding Rj.

  • (7)

    Sign Query: When receiving this query from A2 with (PVIDi,PIDj,mi) as input, C outputs a legitimate signature σi.

Forgery: In this phase, A2 outputs a signature σ for the tuple (PVID,PIDj,m), and A2 wins in this game if the following conditions are satisfied.

  • Sign Query has never been queried with the submitted tuple.

  • Reveal Vehicle Secret Query has never been queried with the pseudonym PVID by A2.

  • σ is a valid signature for the submitted tuple.

4. Proposed Scheme

In this section, we describe our proposed scheme in detail.

4.1. Setup

First, TA and KGC will initialize the system by generating public and secret parameters.

  • (1)

    Given λ as the security parameter, TA chooses a cyclic group G of order q with P as its generator. Then, TA randomly selects tZq and calculates Tpub=t·P.

  • (2)

    Then, TA selects five secure hash functions: H0:G×{0,1}Zq, H1:{0,1}×G3Zq, H2:{0,1}×G2×{0,1}Zq, H3:{0,1}×{0,1}×G4×{0,1}×{0,1}Zq, H4:{0,1}×{0,1}×G2×{0,1}×{0,1}Zq.

  • (3)

    KGC randomly selects sZq and calculates Ppub=s·P.

  • (4)

    TA selects n unique prime numbers Primek=1,2,,n and calculates ϕg=k=1nPrimek. Then, for each Primek, TA calculates αk=ϕgPrimek, αk×βk1modPrimek, ρk=αk×βk individually.

  • (5)

    Finally, TA calculates Ω=k=1nρk and publishes the system parameters, which are denoted as params={G,q,P,Ppub,Tpub,H0,H1,H2,H3,H4,Ω}.

4.2. Registration

Every entity, both the SVs and the users, will first complete the registration after system initialization. The registration process includes vehicle registration, user registration, and group identifier distribution.

4.2.1. Vehicle Registration

As demonstrated in Figure 3, when an SV proceeds with registration, it first generates its partial key and transmits its unique identity to KGC. Upon receiving the request, KGC generates the corresponding partial private key and assigns a category identifier to the SV. Later, according to the received information from KGC, SV can complete its public–private key pair.

Figure 3.

Figure 3

The vehicle registration phase of the proposed scheme.

  • (1)

    A vehicle SVi first randomly selects xiZq and calculates Xi=xiP. Then, it sends {VIDi,Xi} to TA through a secure channel, where VIDi denotes the unique identifier of SVi.

  • (2)

    Upon receiving the request from SVi, TA randomly selects δZq and calculates PVIDi=VIDiH0(δTpub,Tv), where Tv is the current timestamp. Consequently, TA transmits PVIDi to KGC through a secure channel.

  • (3)

    After receiving information from TA, KGC randomly selects riZq and calculates Ri=riP, h1i=H1(PVIDi,Xi,Ri,Ppub), di=ri+sh1imodq. Then, based on the characteristics of the vehicle (e.g., model, capacity), KGC assigns an existing or creates a new class identifier gidiZq to SVi and transmits {di,Ri,gidi} to SVi through a secure channel. Note that every time after a new class identifier gidnew is created and assigned, KGC calculates GIDnew=gidnewP and discloses it to all the entities within the system.

  • (4)

    After obtaining the message from KGC, SVi sets its public key as PKi=(Xi,Ri) and its private key as ski=(xi,di).

4.2.2. User Registration

As presented in Figure 4, when registering, users are required to provide their biometric information. Then, based on the pre-selected category identifier and the pseudonym generated, KGC generates the corresponding credentials, which are consequently encrypted and broadcast to all SVs within the system by TA.

Figure 4.

Figure 4

The user registration phase of the proposed scheme.

  • (1)

    With the real user identity UIDj, the target category identifier GIDj, and the biometric information Bioj acquired from Userj, TA first utilizes the fuzzy extractor to calculate Gen(Bioj)=(θj,τj). Then, TA randomly selects υZq and calculates PIDj=UIDjH0(υTpub,θj||Tj), where Tj is the current timestamp. Consequently, TA transmits {PIDj,θj,GIDj} to KGC through a secure channel.

  • (2)

    Upon receiving the data of TA, KGC randomly selects rjZq and calculates Rj=rjP. Then, KGC calculates the credential dj=rj+sh1jmodq for Userj and transmits it to TA via a secure channel, where h1j=H1(PIDj,GIDj,Rj,Ppub).

  • (3)

    Next, TA randomly selects ujZq and an identifier update secret pjZprime. Then, TA calculates Uj=ujP and Vj=(dj||pj)  H0(ujGIDj,θj||Tj).

  • (4)

    TA calculates ϕg×βj1modpj, ρj=ϕg×βj and records the parameters in a list L.

  • (5)

    Finally, TA updates ϕg with ϕg=ϕg×pj, Ω with Ω=Ω+ρj and broadcasts (PIDj,Rj,τj,Vj,Uj,Tj) through a public channel.

4.2.3. Group Identifier Distribution

To transmit the latest group identifier to all SVs, TA first randomly selects w,zZq and calculates W=wP, ζ=zΩ, and ξ=w+H2(ζ,W,Tpub,Tz)t, where Tz denotes the current timestamp. Later, TA broadcasts (ζ,W,ξ,Tz) to all vehicles within the system.

Upon receiving the message from TA, SVs will first check the freshness of the message. Then, they will verify the authenticity of ζ by checking whether the equation ξP=W+H2(ζ,W,Tpub,Tz)Tpub holds. If not, the message will be rejected. Otherwise, SVs will accept the broadcast message and store ζ locally for the subsequent derivation of the group identifier.

4.3. Authentication

By providing the biometric information, registered users can log into any SV within the same pre-selected target category. Subsequently, the authenticated SVs can establish communications with signature generation and verification. The detailed process of the authentication phase is illustrated in Figure 5.

Figure 5.

Figure 5

The authentication process of the proposed scheme.

4.3.1. User Login

Suppose that Userj is requesting to log in to SVi, where the target identifier GIDj=GIDi.

  • (1)

    Upon receiving the biometric data Bioj from Userj, SVi utilizes the fuzzy extractor to obtain θj=Rep(Bioj,τj).

  • (2)

    Next, SVi calculates dj||pj=VjH0(gidiUj,θj||Tj), h1j=H1(PIDj,GIDi,Rj,Ppub) and checks whether the equation djP=Rj+h1jPpub holds. If not, SVi rejects the request. Otherwise, Userj succeeds in the login process.

4.3.2. Signing

Prior to generating the signature for message mi, SVi extracts the group identifier from the locally stored ζ by calculating z=ζmodpj. Subsequently, SVi proceeds with the signing process, which is detailed as follows:

  • (1)

    SVi randomly selects yiZq and calculates Yi=yiP.

  • (2)

    SVi then acquires the hash values h3i,h4i by calculating h3i=H3(mi,EIDij,PKi,Yi,Rj,z,Ti) and h4i=H4(mi,EIDij,PKi,z,Ti), where Ti denotes the current timestamp and EIDij=PVIDi||PIDj.

  • (3)

    SVi calculates σi=z1(yi+h3ixi+h4i(di+dj))modq, where z1 denotes the multiplicative inverse of z on Zq.

  • (4)

    Finally, SVi constructs the signature ci=(σi,Yi) and sends the tuple (mi,ci,EIDij,PKi,Rj,Ti) to the receiver.

4.3.3. Verification

Upon receiving the tuple from the sender, SVi, a logged-in SV can verify the signature and proceed with authentication.

  • (1)

    Upon receiving the message, vehicle SVk will first check its freshness and will abort it if the timestamp is considered invalid. Then, as mentioned in the signing process, SVk will extract z from ξ stored locally by calculating z=ζmodpl, where pl denotes the identifier update secret obtained during the user login phase.

  • (2)

    With the received parameters, SVk calculates h3i=H3(mi,EIDij,PKi,Yi,Rj,z,Ti) and h4i=H4(mi,EIDij,PKi,z,Ti).

  • (3)

    Finally, SVk checks whether the equation zσiP=Yi+h3iXi+h4i(Ri+Rj+(h1i+h1j)Ppub) holds. If not, the authentication process fails. Otherwise, SVk accepts ci as a valid signature from SVi.

4.4. User Logout

When the service of Userj terminates, SVi erases the credentials and sends a logout notification containing Userj’s information to TA and KGC. Upon receiving the logout message, TA and KGC generate the new credential and identifier update secret for Userj to enable future vehicle usage.

  1. Upon service termination of Userj, SVi randomly selects κZq and calculates χ=κP and ι=κ+H2(PIDj,χ,Xi,Tl)xi, where Tl denotes the current timestamp. Then, SVi transmits (PIDj,χ,ι,Tl) to TA and KGC. When receiving the message, TA and KGC can verify its authenticity by checking whether the equation ιP=χ+H2(PIDj,χ,Xi,Tl)Xi holds.

  2. After successful verification, based on the received PIDj, KGC randomly selects rjZq and generates the corresponding credential dj for Userj with operations described in the User registration section, which are then transmitted to TA.

  3. According to the received information, TA retrieves the relevant parameters from the list L, selects a new identifier update secret pjZprime, and calculates Vj = (dj||pj)  H0(ujGIDj,θj||Tm), where Tm is the current timestamp.

  4. TA then updates the recorded parameters in list L with ρj, which is calculated based on the newly generated pj.

  5. Finally, TA updates ϕg and Ω with ϕgnew=ϕg×pjpj, Ω=Ω+ρjρj, and broadcasts (PIDj,Rj,τj,Vj,Uj,Tm) via a public channel. Additionally, TA performs the operations described in the Group identifier distribution section to prevent potential illegal access with the outdated group identifier.

4.5. Revocation

Upon the detection of irregular behaviors, TA is responsible for revealing the real identity of the malicious user and revoking the corresponding user from the system by generating a new group identifier. Suppose the user to be revoked is Userr.

  1. TA first acquires the corresponding ρr by searching the maintained list L and updates Ω by calculating Ω=Ωρr.

  2. Next, TA randomly selects z,ψZq and calculates ζ=zΩ, Ψ=ψP, and ν=ψ+H2(ζ,Ψ,Tpub,Tr)t, where Tr denotes the current timestamp.

  3. TA then broadcasts (ζ,Ψ,ν,Tr) to all SVs within the system.

  4. Upon receiving the update message from TA, each SV first checks the timestamp of the message. If the message is fresh, then vehicles will continue to check whether the equation νP=Ψ+H2(ζ,Ψ,Tpub,Tr)Tpub holds. If not, then the update process is aborted. Otherwise, a new group identifier can be calculated with z=ζmodpuser, where puser denotes the individual identifier update secret held by each SV within the system.

5. Security Analysis

In this section, we first prove the existential unforgeability of our scheme under the random oracle model. Then, we analyze the security features of our scheme utilizing the defined security model.

5.1. Security Proof

The proofs of Theorem 1 and Theorem 2 are based on a security reduction from the ECDLP, as illustrated in Figure 6. Specifically, we design simulators B1 and B2 to interact with two distinct types of adversaries, A1 and A2, respectively. Given an ECDLP instance (P,aP) provided by the challenger C, the simulator B engages with the adversary A in a simulated environment to produce a forged signature. Subsequently, by applying the Forking Lemma [46,47], B is able to obtain a second forgery corresponding to a different random oracle query made by A. From these two distinct forgeries, the simulator can extract and output the solution to the given ECDLP instance, thus completing the reduction.

Figure 6.

Figure 6

The construction of the security reduction process.

Theorem 1.

With the hardness assumption of the ECDLP, our proposed ECACS scheme realizes EUF-CMA security against Type-I adversaries under the random oracle model.

The following Lemma 1 concludes the proof of Theorem 1.

Lemma 1.

If there exists a Type-I adversary A1 who can successfully forge a valid signature with obvious advantage ϵ1, then a simulator B1 can be constructed to solve the ECDLP with non-negligible advantage (e1)ϵ1e2·Qur(Qh4+Qsig+1), where Qur, Qsig, and Qh4 denote the times of User Registration Query, Sign Query, and H4 Query, respectively.

Proof. 

For the proof of Lemma 1, the challenger C will first set up an ECDLP instance {P,aP|aZp} and send it to B1. Then, B1 will play the following game with A1 in order to acquire the solution to the ECDLP instance. The detailed process is as follows:

Setup: B1 sets Ppub=aP and sends the system parameters {G,q,P,Ppub,H0,H1,H2,H3,H4,Ω} to A1. Meanwhile, B1 maintains six lists to record the query results, namely Lv,Lu,L1,L2,L3,L4.

Query Stage: In this stage, A1 will adaptively submit the following queries.

  • (1)
    Hash Query: B1 will respond to the hash queries from A1 as follows:
    • (a)
      H1 Query: When receiving an H1 hash query with (str,G,Ri,Ppub), if (str,G,Ri,Ppub,h1i)L1, B1 returns h1i. Otherwise, B1 selects h1iZq, adds the tuple (str,G,Ri,Ppub,h1i) to L1, and then returns h1i. Note that the str and G here generally represent a random string and a point on the defined elliptic curve.
    • (b)
      H2 Query: When receiving an H2 hash query with (ζ,W,Ppub,Tz), if (ζ,W,Ppub,Tz,h2i)L2, B1 returns h2i. Otherwise, B1 selects h2iZq, adds the tuple (ζ,W,Ppub,Tz,h2i) to L2, and then returns h2i.
    • (c)
      H3 Query: When receiving an H3 hash query with (mi,EIDij,PKi,Yi,Rj,z,Ti), if the corresponding tuple (mi,EIDij,PKi,Yi,Rj,z,Ti,h3i)L3, then B1 returns h3i. Otherwise, B1 selects h3iZq, adds (mi,EIDij,PKi,Yi,Rj,z,Ti,h3i) to L3, and then returns h3i.
    • (d)
      H4 Query: When receiving an H4 hash query with (mi,EIDij,PKi,z,Ti), if the corresponding tuple (mi,EIDij,PKi,z,Ti,h4i)L4, then B1 returns h4i. Otherwise, B1 selects h4iZq, adds (mi,EIDij,PKi,z,Ti,h4i) to L4, and then returns h4i.
  • (2)

    Vehicle Registration Query: When B1 receives a Vehicle Registration Query from A1 with PVIDi as input, if PVIDi exists in Lv, B1 returns ⊥. Otherwise, B1 selects xi,di,gidi,h1iZq and calculates Ri=diPh1iPpub, Xi=xiP and GIDi=gidiP. Then, B1 adds (PVIDi,xi,Xi,di,Ri,gidi,GIDi) to Lv and (PVIDi,Xi,Ri,Ppub,h1i) to L1.

  • (3)
    User Registration Query: When B1 receives a User Registration Query from A1 with PIDj as input, if PIDj exists in Lu, B1 returns ⊥. Otherwise, B1 continues the game as follows:
    • If PIDj=PID, B1 selects rj,h1iZq and calculates Rj=rjP. Then, B1 adds the tuple (PIDj,GIDj,,Rj) to Lu and the tuple (PIDj,GIDj,Rj,Ppub,h1j) to L1, where GIDj is selected from the existing records in Lv.
    • If PIDjPID, B1 selects dj,h1iZq and calculates Rj=djPh1iPpub. Then, B1 adds (PIDj,GIDj,dj,Rj) to Lu and (PIDj,GIDj,Rj,Ppub,h1j) to L1, where GIDj is selected from the existing records in Lv.
  • (4)

    Reveal Vehicle Partial Key Query: When B1 receives a Reveal Vehicle Partial Key Query from A1 with PVIDi as input, if the tuple (PVIDi,xi,Xi,di,Ri,gidi,GIDi)Lv, B1 returns the corresponding di. Otherwise, B1 first executes the Vehicle Registration Query with PVIDi as input and then returns the corresponding di.

  • (5)
    Reveal User Private Key Query: When B1 receives a Reveal User Private Key Query from A1 with PIDj as input, if PIDj=PID, B1 aborts the game. Otherwise, B1 continues the game as follows:
    • If PIDjLu, B1 returns the corresponding dj.
    • If PIDjLu, B1 first executes the User Registration Query and then returns the corresponding dj.
  • (6)

    Reveal Vehicle Secret Query: When B1 receives a Reveal Vehicle Secret Query from A1 with PVIDi as input, B1 returns xi if (PVIDi,xi,Xi,di,Ri,gidi,GIDi)Lv. Otherwise, B1 first executes the Vehicle Registration Query with PVIDi as input and then returns the corresponding xi.

  • (7)

    Reveal Vehicle Public Key Query: When B1 receives a Reveal Public Key Query from A1 with PVIDi as input, if (PVIDi,xi,Xi,di,Ri,gidi,GIDi)Lv, B1 returns the corresponding (Xi,Ri). Otherwise, B1 first executes the Vehicle Registration Query with PVIDi as input and then returns the corresponding (Xi,Ri).

  • (8)

    Reveal User Public Key Query: When B1 receives a Reveal User Public Key Query from A1 with PIDj as input, if (PIDj,GIDj,dj,Rj)Lu, B1 returns the corresponding Rj. Otherwise, B1 first executes the User Registration Query with PIDj as input and then returns the corresponding Rj.

  • (9)

    Replace Vehicle Public Key Query: When B1 receives a Replace Vehicle Public Key Query from A1 with (PVIDi,Xi,Ri) as input, B1 sets (Xi,Ri) as PVIDis new public key and updates the record in Lv.

  • (10)

    Replace User Public Key Query: When B1 receives a Replace User Public Key Query from A1 with (PIDj,Rj) as input, B1 sets Ri as PIDj’s new public key and updates the record in Lu.

  • (11)
    Sign Query: When B1 receives a Sign Query from A1 with (PVIDi,PIDj,mi) as input, B1 first checks whether PVIDi and PIDj exist in Lv and Lu. If not, B1 first executes the Vehicle Registration Query and User Registration Query with the input identities. Then, after acquiring the corresponding records, B1 continues the game as follows:
    • If PIDjPID, B1 selects z,yi,h3i,h4iZq and obtains h1i, h1j from L1. Then, B1 calculates Yi=yiP, σi=z1(yi+h3ixi+h4i(di+dj)). Then, B1 adds (mi,EIDij,GIDj,PKi,Yi,Rj,z,Tz,h3i) to L3 and (mi,EIDij,GIDj,PKi,z,Tz,h4i) to L4, where EIDij=PVIDi||PIDj. Finally, B1 returns (σi,Yi,Tz) to A1.
    • If PIDj=PID, B1 selects z,yi,h3i,h4iZq and obtains h1i, h1j from L1. Then, B1 sets σi=z1yi, Yi=zσiPh3iXih4i(Ri+Rj+h1ijPpub), where h1ij=(h1i+h1j). Then, B1 adds (mi,EIDij,GIDj,PKi,Yi,Rj,z,Tz,h3i) to L3 and (mi,EIDij,GIDj,PKi,z,Tz,h4i) to L4, where EIDij=PVIDi||PIDj. Finally, B1 returns (σi,Yi,Tz) to A1.

Forgery Stage: After all the queries have been made and replied to, A1 outputs a forged signature (σ1,Yi) for the identity-message pair (PVIDi,PIDj,m). If PIDjPID, B1 outputs ⊥ and aborts the game. Otherwise, according to the Forking Lemma, B1 can rewind the game process and make A1 output another forged signature (σ2,Yi) by changing the output of H4. Hence, we have

σ1=yi+h3xi+h4(di+rj+h1ija)σ2=yi+h3xi+h4(di+rj+h1ija)

From the above equations, B1 outputs a=1h1ij(σ1σ2h4h4dirj) as the solution to the ECDLP instance.

Let E1 denote the event that the game does not abort in the Query Stage, E2 denote the event that the game does not abort in the Forge Stage, and E3 denote the event that A1 successfully outputs two valid forged signatures in the game. Then the advantage of B1 solving the ECDLP instance can be presented with Pr[ϵB1]=Pr[E1E2E3]=Pr[E1]Pr[E2|E1]Pr[E3|E1E2]. Furthermore, we have Pr[E1](11Qur)(Qupk+Qsig), Pr[E2|E1]1Qur, where Qur denotes the times of User Registration Query, Qupk denotes the times of Reveal User Private Key Query, and Qsig denotes the times of Sign Query.

According to the Forking Lemma, we have Pr[E3|E1E2](11e)ϵ1Qh4+Qsig+1, where ϵ1 represents the advantage that A1 can successfully forge a signature, and Qh4 represents the times of H4 Query.

Therefore, B1’s advantage of solving the ECDLP instance is

Pr[ϵB1]=Pr[E1E2E3]=Pr[E1]Pr[E2|E1]Pr[E3|E1E2][(11Qur)(Qupk+Qsig)]1Qur(11e)ϵ1Qh4+Qsig+1(e1)ϵ1e2·Qur(Qh4+Qsig+1)

Thus, if there exists an adversary A1 who can successfully forge a signature with advantage ϵ1, then B1 can output the solution to the ECDLP instance with probability (e1)ϵ1e2·Qur(Qh4+Qsig+1). □

Theorem 2.

With the hardness assumption of the ECDLP, our proposed ECACS scheme realizes EUF-CMA security against Type-II adversaries under the random oracle model.

The following Lemma 2 concludes the proof of Theorem 2.

Lemma 2.

If there exists a Type-II adversary A2 who can successfully forge a valid signature with obvious advantage ϵ2, then a simulator B2 can be constructed to solve the ECDLP with non-negligible advantage (11e)ϵ2e·QvrQh3, where Qvr and Qh3 denote the times of Vehicle Registration Query and H3 Query, respectively.

Proof. 

For the proof of Lemma 2, the challenger C will set up an ECDLP instance {P,bP|bZp} and send it to B2. Then, B2 will play the following game with A2 in order to acquire the solution to the ECDLP instance. The detailed process is as follows:

Setup: B2 sets Ppub=sP and sends s and the parameters {G,q,P,Ppub,H0,H1,H2,H3,H4,Ω} to A2. Meanwhile, B2 maintains six lists to record the query results, namely Lv,Lu,L1,L2,L3,L4.

Query Stage: In this stage, A2 will adaptively submit the following queries.

  • (1)

    Hash Query: B2 answers the Hash Query the same as in Game I.

  • (2)
    Vehicle Registration Query: When B2 receives a Vehicle Registration Query from A2 with PVIDi as input, if PVIDi exists in Lv, B1 returns ⊥. Otherwise, continue the game as follows.
    • If PVIDi=PVID, B2 selects ri,gidi,h1iZq and calculates Ri=riP, GIDi=gidiP and di=ri+h1is. Then, B2 sets Xi=bP and adds the tuple (PVIDi,,Xi,di,Ri,gidi,GIDi) to Lv and (PVIDi,Xi,Ri,Ppub,h1i) to L1.
    • If PVIDiPVID, B2 selects xi,ri,gidi,h1iZq and calculates Ri=riP, Xi=xiP, GIDi=gidiP and di=ri+h1is. Then, B1 adds the tuple (PVIDi,xi,Xi,di,Ri,gidi,GIDi) to Lv and (PVIDi,Xi,Ri,Ppub,h1i) to L1.
  • (3)

    User Registration Query: When B1 receives a User Registration Query from A1 with PIDj as input, if PIDj exists in Lu, B1 returns ⊥. Otherwise, B2 selects dj,h1iZq and calculates Rj=djPh1iPpub. Then, B2 adds the tuple (PIDj,GIDj,dj,Rj) to Lu and the tuple (PIDj,GIDj,Rj,Ppub,h1j) to L1, where GIDj is selected from the existing records in Lv.

  • (4)

    Reveal User Private Key Query: When B2 receives a Reveal User Private Key Query from A2 with PIDj as input, if the tuple (PIDj,GIDj,dj,Rj)Lu, B2 returns the corresponding dj. Otherwise, B2 first executes the User Registration Query with PIDj as input and then returns the corresponding dj.

  • (5)
    Reveal Vehicle Secret Query: When B2 receives a Reveal Vehicle Secret Query from A2 with PVIDi as input, if PVIDi=PVID, B2 aborts the game. Otherwise, B2 continues the game as follows:
    • If PVIDiLv, B2 returns the corresponding xi.
    • If PVIDiLv, B2 first executes the Vehicle Registration Query and then returns the corresponding xi.
  • (6)

    Reveal Vehicle Public Key Query: When B2 receives a Reveal Public Key Query from A2 with PVIDi as input, if (PVIDi,xi,Xi,di,Ri,gidi,GIDi)Lv, B2 returns the corresponding (Xi,Ri). Otherwise, B2 first executes the Vehicle Registration Query with PVIDi as input and then returns the corresponding (Xi,Ri).

  • (7)

    Reveal User Public Key Query: When B2 receives a Reveal User Public Key Query from A2 with PIDj as input, if (PIDj,GIDj,dj,Rj)Lu, B2 returns the corresponding Rj. Otherwise, B2 first executes the User Registration Query with PIDj as input and then returns the corresponding Rj.

  • (8)
    Sign Query: When B2 receives a Sign Query from A2 with (PVIDi,PIDj,mi) as input, B2 first checks whether PVIDi and PIDj exist in Lv and Lu. If not, B2 first executes the Vehicle Registration Query and User Registration Query with the input identities. Then, after acquiring the corresponding records, B2 continues the game as follows:
    • If PVIDjPVID, B2 selects z,yi,h3i,h4iZq and obtains h1i, h1j from L1. Then, B2 calculates Yi=yiP, σi=z1(yi+h3ixi+h4i(di+dj)). Then, B2 adds (mi,EIDij,GIDj,PKi,Yi,Rj,z,Tz,h3i) to L3 and (mi,EIDij,GIDj,PKi,z,Tz,h4i) to L4. Finally, B2 returns (σi,Yi,Tz) to A2.
    • If PVIDj=PVID, B2 selects z,yi,h3i,h4iZq and obtains h1i, h1j from L1. Then, B2 sets σi=z1yi and calculates Yi=zσiPh3iXih4i(Ri+Rj+h1ijPpub), where h1ij=(h1i+h1j). B2 then adds (mi,EIDij,GIDj,PKi,Yi,Rj,z,Tz,h3i) to L3 and (mi,EIDij,GIDj,PKi,z,Tz,h4i) to L4, where EIDij=PVIDi||PIDj. Finally, B2 returns (σi,Yi,Tz) to A2.

Forgery Stage: After all the queries have been made and replied to, A2 outputs a forged signature (σ1,Yi) for the identity-message pair (PVIDi,PIDj,m). If PVIDiPVID, B2 outputs ⊥ and aborts the game. Otherwise, according to the Forking Lemma, B2 can rewind the game process and make A2 output another forged signature (σ2,Yi) by changing the output of H3. Hence, we have

σ1=yi+h3b+h4(di+dj)σ2=yi+h3b+h4(di+dj)

From the above equations, B1 outputs b=σ1σ2h3h3 as the solution to the ECDLP instance.

Let E1 denote the event that the game does not abort in Query Stage, E2 denote the event that the game does not abort in Forge Stage, and E3 denote the event that A2 successfully outputs two valid forged signatures in the game. Then the advantage of B2 solving the ECDLP instance can be presented with Pr[ϵB1]=Pr[E1E2E3]=Pr[E1]Pr[E2|E1]Pr[E3|E1E2]. Furthermore, we have Pr[E1](11Qvr)(Qrvs+Qsig+1), Pr[E2|E1]1Qvr, where Qvr denotes the times of Vehicle Registration Query, Qrvs denotes the times of Reveal Vehicle Secret Query, and Qsig denotes the times of Sign Query.

According to the Forking Lemma, we have Pr[E3|E1E2](11e)ϵ2Qh3+Qsig+1, where ϵ2 represents the advantage that A2 can successfully forge a signature and Qh3 represents the times of H3 Query.

Therefore, B2’s advantage of solving the ECDLP instance is

Pr[ϵB2]=Pr[E1E2E3]=Pr[E1]Pr[E2|E1]Pr[E3|E1E2][(11Qvr)(Qrvs+Qsig+1)]1Qvr(11e)ϵ2Qh3+Qsig+1(e1)ϵ2e2·Qvr(Qh3+Qsig+1))

Thus, if there exists an adversary A2 who can successfully forge a signature with advantage ϵ2, then B2 can output the solution to the ECDLP instance with probability (e1)ϵ2e2·Qvr(Qh3+Qsig+1)). □

5.2. Security Features

In particular, our CLS scheme satisfies the following security objectives: message authenticity and integrity, anonymity, traceability, revocability, and resistance against replay and MITM attacks.

5.2.1. Message Authenticity and Integrity

Based on the existential unforgeability proof presented above, it is computationally infeasible for either Type-I or Type-II adversaries to forge a valid signature. Furthermore, since the corresponding identifier update secrets of revoked users are no longer included in Ω, no revoked user can generate a valid signature with any SV due to the inability to extract the latest group identifier z. Consequently, our proposed scheme ensures both the authenticity and integrity of the transmitted message.

5.2.2. Anonymity

In our proposed scheme, the identities utilized by vehicles and users in the authentication process are pseudonyms generated based on their real identities and TA’s secret key t. Consequently, no adversary can obtain the real identity of any entity without access to TA’s secret key. Hence, our proposed scheme achieves anonymity.

5.2.3. Traceability

When emergencies occur, TA can reveal the real identity of any entity by calculating VIDi=PVIDiH0(tRj,Ti) or UIDi=PIDiH0(υTpub,θj||Tj). Thus, our proposed scheme meets the requirement of traceability.

5.2.4. Revocability

In the event of a user with unusual behaviors, it is imperative for TA to promptly revoke the user’s ability to process authentication within the system. By updating the group identifier z and distributing it through the application of the Chinese Remainder Theorem, only vehicles authenticated with the current legitimate users can generate valid signatures and perform the verification process. Thus, our proposed scheme effectively supports the revocation feature.

5.2.5. Resistance Against Replay Attacks

In our scheme, the messages transmitted during the signing and verification processes all contain timestamps. Any message that fails to meet the freshness requirements will be rejected. Therefore, our scheme is capable of resisting replay attacks.

5.2.6. Resistance Against MITM Attacks

To launch a man-in-the-middle (MITM) attack, an adversary would first need to forge a valid signature; otherwise, it would not be able to modify the signature it captures. Moreover, based on the existential unforgeability proof provided above, neither Type-I nor Type-II adversaries can forge a valid signature. Therefore, our proposed scheme is resistant to MITM attacks.

6. Performance Evaluation

In this section, we provide the performance comparison between our proposed scheme and the related schemes [48,49,50,51,52,53,54]. Given that practical communications among entities are established over wireless channels, necessitating timely and lightweight information transmission, our evaluation primarily focuses on the calculation time cost and information payload size. Specifically, our evaluation encompasses four key aspects: functional properties, computational overhead, communication overhead, and the revocation feature.

6.1. Experiment Environment

Our experiments are conducted on a Lenovo personal computer (Lenovo Group Ltd., Beijing, China) equipped with an Intel Core i5-9500T 2.20 GHz CPU and 8 GB of RAM. The standard open-source MIRACL Crypto SDK is employed on the Ubuntu 22.04 operating system to implement the cryptographic operations, with the security parameter λ set to 128 bits to meet the required security standards. The bilinear pairing operations for pairing-based schemes are performed over a Tate pairing-based curve with an embedding degree of 2, while the scalar operations for ECC-based schemes are executed over the secp256r1 curve. The measured results of the operation time cost are presented in Table 3.

Table 3.

Execution time of cryptographic operations.

Symbol Meaning Time (ms)
Tbp Bilinear Pairing 27.844
Tbpm Pairing-based Scalar Multiplication 9.027
Tbpa Pairing-based Point Addition 0.055
Tem Scalar Multiplication 2.632
Tea Point Addition 0.018
Thtp Hash to Point Operation 5.433
Th General Secure Hash 0.001

6.2. Functional Properties

The comparison results of the functionalities of our proposed scheme with other state-of-the-art relatives are illustrated in Table 4. While the scheme proposed in [48] achieves unforgeability, its reliance on bilinear pairings incurs substantial computational overhead. Regarding ECC-based schemes, though the schemes proposed in [49,50] support revocation, they overlook the need for a decoupled user authentication phase. The scheme proposed in [54] utilizes passwords and biometric data to realize the authentication processes for users, but it is based on individual relationships between users and vehicles, which lacks the flexibility required in rental scenarios. In contrast, our scheme utilizes the Chinese Remainder Theorem to achieve user revocation. Furthermore, the fuzzy extractor and category identifier mechanism allow our scheme to support both user decoupling and category-range selective authentication. Hence, our scheme demonstrates superior performance under the smart car-sharing situations.

Table 4.

Properties of the related schemes.

Scheme Pairing-Free Unforgeability Revocation User Decoupling Category Range Selection
[48]
[49]
[50]
[51]
[52]
[53]
[54]
Our scheme

✔: The scheme satisfies the feature. ✕: The scheme does not satisfy the feature.

6.3. Computational Overhead

To conduct a comprehensive evaluation, we assess the computational overhead of the schemes by analyzing the time cost associated with signature generation and verification, with the results detailed in Table 5 and Figure 7.

Table 5.

Comprehensive overhead comparison with the related schemes.

Scheme Computational Overhead Communication
Overhead (byte)
Signature Generation (ms) Signature Validation (ms)
[48] 5Tbpm+5Tbpa+2Thtp+2Th=56.278 5Tbp+2Tbpm+2Tbpa+4Thtp+2Th=179.118 |2G1|+3|Zq|+|T|
[49] 4Tem+2Tea+4Th=10.568 5Tem+3Tea+4Th=13.218 |G|+2|Zq|+|T|
[50] 3Tem+Th=7.897 5Tem+3Tea+Th=13.215 2|G|+2|Zq|+|T|
[51] Tem+2Th=2.634 4Tem+3Tea+3Th=10.585 |G|+2|Zq|+|T|
[52] Tem+Th=2.633 5Tem+3Tea+2Th=13.216 |G|+2|Zq|+|T|
[53] Tem+2Th=2.634 4Tem+3Tea+3Th=10.585 |G|+2|Zq|+|T|
[54] 2Tem+2Tea+2Th+Thtp=10.735 4Tem+3Tea+2Th+Thtp=16.017 2|G|+|Zq|+|T|
Our scheme Tem+2Th=2.634 4Tem+4Tea+4Th=10.604 |G|+2|Zq|+|T|

Figure 7.

Figure 7

Comparison of the computational overhead of our proposed scheme with related works [48,49,50,51,52,53,54]: (a) signature generation phase; (b) signature verification phase.

For our scheme, the signature generation process involves one scalar multiplication operation and two general secure hash operations, and the computational cost is Tem+2Th=2.634 ms. As for signature verification, our proposed scheme requires four ECC scalar multiplication operations, four ECC point addition operations, and four general secure hash operations, which cost 4Tem+4Tea+4Th=10.604 ms. Based on the evaluation, our scheme demonstrates competitive computational efficiency compared with other related schemes. Moreover, our scheme offers additional functionalities, including category-range selection when performing authentication between vehicles and users, as well as the feature of revocation. Therefore, it is reasonable to conclude that our scheme demonstrates outstanding performance in terms of computational overhead.

6.4. Communication Overhead

In our evaluation, we measure the communication overhead of the related schemes based on the length of the transmitted signature tuples. To meet the requirements of the security parameter, we set the size of elements in G1 to 384 bytes, the size of elements in G to 64 bytes, and the size of elements in Zq to 32 bytes. Considering schemes implying timestamps to resist replay attacks, we set the size of the timestamps to 4 bytes. The comparison results are presented in Table 5 and Figure 8.

Figure 8.

Figure 8

Comparison of the communication overhead of our proposed scheme with related works [48,49,50,51,52,53,54].

In our proposed scheme, the communication overhead for a signature is |G|+2|Zq|+|T|=132 bytes. As demonstrated in Table 5 and Figure 4, our scheme is superior to the schemes in [48,54] and is at the same low overhead level as the schemes in [49,51,52,53]. Moreover, while maintaining communication efficiency, our proposed scheme realizes enhanced functionality that increases its practicality in real-world scenarios. Therefore, our scheme outperforms the related scheme in the field of communication overhead.

6.5. Revocation Feature

Table 6 presents a comparative analysis of the revocation feature of our proposed scheme against related schemes. Specifically, the schemes in [48,51,53,54] lack the functionality of revocation. Meanwhile, the schemes in [8,52] implement revocation through the use of revocation lists. However, this approach inherently incurs a linear increase in overhead as the system scales and the number of entities grows. Likewise, the revocation mechanism in [50] requires synchronization with the blockchain database, introducing additional latency while still exhibiting linear growth in resource consumption.

Table 6.

Comparison of the revocation feature.

Scheme Support Revocation Method Overhead Complexity
[48] N/A N/A
[49] Revocation list Linear
[50] Blockchain database Linear
[51] N/A N/A
[52] Revocation list Linear
[53] N/A N/A
[54] N/A N/A
Our scheme CRT Constant

✔: The scheme satisfies the feature. ✕: The scheme does not satisfy the feature.

In contrast, our proposed scheme leverages the CRT and achieves revocation by broadcasting the group identifier through public channels, thereby ensuring that revocation efficiency remains independent of system scale. This inherent scalability makes our scheme particularly suitable for large-scale applications.

7. Conclusions

In this paper, we introduced an enhanced certificateless authentication scheme tailored for smart car-sharing environments. By incorporating biometric information and leveraging the Chinese Remainder Theorem for user membership management, our scheme provides a lightweight, decoupled, and fine-grained authentication mechanism between users and vehicles, eliminating the need for user-side computation. The implementation of category identifiers further enhances flexibility, allowing users to access any vehicle within a designated class, which is a feature essential for the dynamic nature of practical car-sharing. A formal security analysis proves our scheme is secure against both Type-I and Type-II adversaries under the random oracle model. Furthermore, performance evaluations demonstrate that our scheme achieves competitive efficiency while delivering significant practical functionalities. Future work will focus on extending this framework to multi-domain environments and developing practical cross-domain authentication protocols.

Author Contributions

Conceptualization, Z.S. and X.K.; methodology, X.K.; validation, X.K. and T.Y.; formal analysis, X.K.; writing—original draft preparation, X.K.; writing—review and editing, Z.S., X.K. and T.Y.; visualization, X.K.; supervision, Z.S.; project administration, Z.S.; funding acquisition, Z.S. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Funding Statement

This research was funded by the National Key R&D Program of China (Grant. 2022YFB3104602).

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

  • 1.Rajkumar Y., Santhosh Kumar S. A comprehensive survey on communication techniques for the realization of intelligent transportation systems in IoT based smart cities. Peer-Peer Netw. Appl. 2024;17:1263–1308. doi: 10.1007/s12083-024-01627-9. [DOI] [Google Scholar]
  • 2.Ji B., Zhang X., Mumtaz S., Han C., Li C., Wen H., Wang D. Survey on the internet of vehicles: Network architectures and applications. IEEE Commun. Stand. Mag. 2020;4:34–41. doi: 10.1109/MCOMSTD.001.1900053. [DOI] [Google Scholar]
  • 3.Karabulut M.A., Shah A.S., Ilhan H., Pathan A.S.K., Atiquzzaman M. Inspecting VANET with various critical aspects—A systematic review. Ad Hoc Netw. 2023;150:103281. doi: 10.1016/j.adhoc.2023.103281. [DOI] [Google Scholar]
  • 4.Vélez A.M.A. Economic impacts, carbon footprint and rebound effects of car sharing: Scenario analysis assessing business-to-consumer and peer-to-peer car sharing. Sustain. Prod. Consum. 2023;35:238–249. doi: 10.1016/j.spc.2022.11.004. [DOI] [Google Scholar]
  • 5.Statista Market Insights Car-Sharing–Worldwide. [(accessed on 26 May 2025)]. Available online: https://www.statista.com/outlook/mmo/shared-mobility/car-sharing/worldwide.
  • 6.Huang C., Lu R., Ni J., Shen X. DAPA: A decentralized, accountable, and privacy-preserving architecture for car sharing services. IEEE Trans. Veh. Technol. 2020;69:4869–4882. doi: 10.1109/TVT.2020.2980777. [DOI] [Google Scholar]
  • 7.Liu Y., He D., Bao Z., Luo M., Peng C. PEACS: A Privacy-Enhancing and Accountable Car Sharing System. IEEE Internet Things J. 2024;11:16422–16435. doi: 10.1109/JIOT.2024.3353458. [DOI] [Google Scholar]
  • 8.Zhu D., Guan Y. Secure and Lightweight Conditional Privacy-Preserving Identity Authentication Scheme for VANET. IEEE Sens. J. 2024;24:35743–35756. doi: 10.1109/JSEN.2024.3431557. [DOI] [Google Scholar]
  • 9.Yue Q., Jiang W., Lei H. A lightweight certificateless aggregate signature scheme without pairing for VANETs. Sci. Rep. 2025;15:23663. doi: 10.1038/s41598-025-08656-1. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 10.Rajkumar Y., Kumar S.S. An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks. Wirel. Netw. 2024;30:335–362. doi: 10.1007/s11276-023-03473-8. [DOI] [Google Scholar]
  • 11.Mundhe P., Verma S., Venkatesan S. A comprehensive survey on authentication and privacy-preserving schemes in VANETs. Comput. Sci. Rev. 2021;41:100411. doi: 10.1016/j.cosrev.2021.100411. [DOI] [Google Scholar]
  • 12.AlMarshoud M., Sabir Kiraz M., Al-Bayatti A.H. Security, privacy, and decentralized trust management in VANETs: A review of current research and future directions. ACM Comput. Surv. 2024;56:1–39. doi: 10.1145/3656166. [DOI] [Google Scholar]
  • 13.Wang Y., Liu Y., Tian Y. ISC-CPPA: Improverd-security certificateless conditional privacy-preserving authentication scheme with revocation. IEEE Trans. Veh. Technol. 2022;71:12304–12314. doi: 10.1109/TVT.2022.3194060. [DOI] [Google Scholar]
  • 14.Al-Mekhlafi Z.G., Al-Janabi H.D.K., Al-Shareeda M.A., Mohammed B.A., Alshudukhi J.S., Al-Dhlan K.A. Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication. Peer-Peer Netw. Appl. 2024;17:3703–3721. doi: 10.1007/s12083-024-01778-9. [DOI] [Google Scholar]
  • 15.Hou Y., Cao Y., Xiong H., Sun Z., Mumtaz S., Tian D. CASKA-CRT: Chinese remainder theorem empowered certificateless aggregate signcryption scheme with key agreement in IoVs. IEEE Trans. Intell. Veh. 2024;9:6814–6829. doi: 10.1109/TIV.2024.3388724. [DOI] [Google Scholar]
  • 16.Raya M., Hubaux J.P. Securing vehicular ad hoc networks. J. Comput. Secur. 2007;15:39–68. doi: 10.3233/JCS-2007-15103. [DOI] [Google Scholar]
  • 17.Sun Y., Lu R., Lin X., Shen X., Su J. An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 2010;59:3589–3603. doi: 10.1109/TVT.2010.2051468. [DOI] [Google Scholar]
  • 18.Di C., Wu W. A Novel Identity-Based Mutual Authentication Scheme for Vehicle Ad Hoc Networks. Wirel. Commun. Mob. Comput. 2022;2022:7881079. doi: 10.1155/2022/7881079. [DOI] [Google Scholar]
  • 19.Umar M., Islam S.H., Mahmood K., Ahmed S., Ghaffar Z., Saleem M.A. Provable secure identity-based anonymous and privacy-preserving inter-vehicular authentication protocol for VANETS using PUF. IEEE Trans. Veh. Technol. 2021;70:12158–12167. doi: 10.1109/TVT.2021.3118892. [DOI] [Google Scholar]
  • 20.Li Q., Hsu C.F., Raymond Choo K.K., He D. A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks. Secur. Commun. Netw. 2019;2019:7871067. doi: 10.1155/2019/7871067. [DOI] [Google Scholar]
  • 21.Al-Riyami S.S., Paterson K.G. Certificateless public key cryptography; Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security; Taipei, Taiwan. 30 November–4 December 2003; Berlin/Heidelberg, Germany: Springer; 2003. pp. 452–473. [Google Scholar]
  • 22.Ma K., Zhou Y., Wang Y., Dong C., Xia Z., Yang B., Zhang M. An efficient certificateless signature scheme with provably security and its applications. IEEE Syst. J. 2023;17:5636–5647. doi: 10.1109/JSYST.2023.3269597. [DOI] [Google Scholar]
  • 23.Malip A., Ng S.L., Li Q. A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. Secur. Commun. Netw. 2014;7:588–601. doi: 10.1002/sec.760. [DOI] [Google Scholar]
  • 24.Zhong H., Han S., Cui J., Zhang J., Xu Y. Privacy-preserving authentication scheme with full aggregation in VANET. Inf. Sci. 2019;476:211–221. doi: 10.1016/j.ins.2018.10.021. [DOI] [Google Scholar]
  • 25.Wang H., Wang L., Zhang K., Li J., Luo Y. A conditional privacy-preserving certificateless aggregate signature scheme in the standard model for VANETs. IEEE Access. 2022;10:15605–15618. doi: 10.1109/ACCESS.2022.3147595. [DOI] [Google Scholar]
  • 26.Shim K.A. Security analysis of conditional privacy-preserving authentication schemes for VANETs. IEEE Access. 2023;11:33956–33963. doi: 10.1109/ACCESS.2023.3263738. [DOI] [Google Scholar]
  • 27.Zheng H., Luo M., Zhang Y., Peng C., Feng Q. A security-enhanced pairing-free certificateless aggregate signature for vehicular Ad-Hoc networks. IEEE Syst. J. 2022;17:3822–3833. doi: 10.1109/JSYST.2022.3220869. [DOI] [Google Scholar]
  • 28.Cheng G., Huang J., Wang Y., Zhao J., Kong L., Deng S., Yan X. Conditional privacy-preserving multi-domain authentication and pseudonym management for 6G-enabled IoV. IEEE Trans. Inf. Forensics Secur. 2023;19:10206–10220. doi: 10.1109/TIFS.2023.3314211. [DOI] [Google Scholar]
  • 29.Yin D., Gong B. A Lightweight Certificateless Mutual Authentication Scheme Based on Signatures for IIoT. IEEE Internet Things J. 2024;11:26852–26865. doi: 10.1109/JIOT.2024.3389018. [DOI] [Google Scholar]
  • 30.Lin H.T., Jhuang W.L. Blockchain-Based Lightweight Certificateless Authenticated Key Agreement Protocol for V2V Communications in IoV. IEEE Internet Things J. 2024;11:27744–27759. doi: 10.1109/JIOT.2024.3400320. [DOI] [Google Scholar]
  • 31.Gu Y., Shen L., Gao C., Zhu T. Efficient and Secure Certificateless Aggregate Signature Scheme in Vehicle Networks. Netinfo Secur. 2024;24:188–202. [Google Scholar]
  • 32.Genc Y., Aytas N., Akkoc A., Afacan E., Yazgan E. ELCPAS: A new efficient lightweight certificateless conditional privacy preserving authentication scheme for IoV. Veh. Commun. 2023;39:100549. doi: 10.1016/j.vehcom.2022.100549. [DOI] [Google Scholar]
  • 33.Ali I., Chen Y., Ullah N., Kumar R., He W. An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Trans. Veh. Technol. 2021;70:1278–1291. doi: 10.1109/TVT.2021.3050399. [DOI] [Google Scholar]
  • 34.Li X., Yin X., Ning J. RelCLAS: A Reliable Malicious KGC-Resistant Certificateless Aggregate Signature Protocol for Vehicular Ad Hoc Networks. IEEE Internet Things J. 2023;10:21100–21114. doi: 10.1109/JIOT.2023.3285402. [DOI] [Google Scholar]
  • 35.Xiong W., Wang R., Wang Y., Zhou F., Luo X. CPPA-D: Efficient conditional privacy-preserving authentication scheme with double-insurance in VANETs. IEEE Trans. Veh. Technol. 2021;70:3456–3468. doi: 10.1109/TVT.2021.3064337. [DOI] [Google Scholar]
  • 36.Gong Z., Gao T., Guo N. PCAS: Cryptanalysis and improvement of pairing-free certificateless aggregate signature scheme with conditional privacy-preserving for VANETs. Ad Hoc Netw. 2023;144:103134. doi: 10.1016/j.adhoc.2023.103134. [DOI] [Google Scholar]
  • 37.Ali I., Hassan A., Li F. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Veh. Commun. 2019;16:45–61. doi: 10.1016/j.vehcom.2019.02.002. [DOI] [Google Scholar]
  • 38.Wu W., Ye F. IPCAS: An improved conditional privacy-preserving certificateless aggregate signature scheme without bilinear pairing for VANETs. J. Syst. Archit. 2024;152:103175. doi: 10.1016/j.sysarc.2024.103175. [DOI] [Google Scholar]
  • 39.Paliwal S., Cherukuri A.K., Gao X.Z. Dynamic private Modulus based password conditional privacy preserving authentication and key-agreement protocol for VANET. Wirel. Pers. Commun. 2022;123:2061–2088. doi: 10.1007/s11277-021-09228-y. [DOI] [Google Scholar]
  • 40.Roeschlin M., Vaas C., Rasmussen K.B., Martinovic I. Bionyms: Driver-centric message authentication using biometric measurements; Proceedings of the 2018 IEEE Vehicular Networking Conference (VNC); Taipei, Taiwan. 5–7 December 2018; pp. 1–8. [Google Scholar]
  • 41.Islam S.H., Obaidat M.S., Vijayakumar P., Abdulhay E., Li F., Reddy M.K.C. A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. Future Gener. Comput. Syst. 2018;84:216–227. doi: 10.1016/j.future.2017.07.002. [DOI] [Google Scholar]
  • 42.Cui J., Liu X., Zhong H., Zhang J., Wei L., Bolodurina I., He D. A Practical and Provably Secure Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue. IEEE Trans. Netw. Sci. Eng. 2024;11:1454–1468. doi: 10.1109/TNSE.2023.3323972. [DOI] [Google Scholar]
  • 43.Azees M., Rajasekaran A.S., Vijayakumar P., Karuppiah M. Hybrid CMOS Memristor Based Biometric OBU Authentication and Anonymous Mutual Authentication for Secure Communication in Fog-Based VANETs. IEEE Trans. Intell. Transp. Syst. 2024;25:11117–11129. doi: 10.1109/TITS.2024.3378724. [DOI] [Google Scholar]
  • 44.Wang L., Xu J., Qin B., Wen M., Chen K. An Efficient Fuzzy Certificateless Signature-Based Authentication Scheme Using Anonymous Biometric Identities for VANETs. IEEE Trans. Dependable Secur. Comput. 2025;22:292–307. doi: 10.1109/TDSC.2024.3392470. [DOI] [Google Scholar]
  • 45.Huang X., Mu Y., Susilo W., Wong D.S., Wu W. Certificateless signatures: New schemes and security models. Comput. J. 2012;55:457–474. doi: 10.1093/comjnl/bxr097. [DOI] [Google Scholar]
  • 46.Pointcheval D., Stern J. Security arguments for digital signatures and blind signatures. J. Cryptol. 2000;13:361–396. doi: 10.1007/s001450010003. [DOI] [Google Scholar]
  • 47.Bellare M., Neven G. Multi-signatures in the plain public-key model and a general forking lemma; Proceedings of the 13th ACM Conference on Computer and Communications Security; Alexandria, VA, USA. 30 October–3 November 2006; pp. 390–399. [Google Scholar]
  • 48.Kar J., Liu X., Li F. CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks. J. Inf. Secur. Appl. 2021;61:102905. doi: 10.1016/j.jisa.2021.102905. [DOI] [Google Scholar]
  • 49.Zhu Y., Zhou Y., Wang J., Yang B., Zhang M. A Lightweight Cross-Domain Direct Identity Authentication Protocol for VANETs. IEEE Internet Things J. 2024;11:37741–37757. doi: 10.1109/JIOT.2024.3438257. [DOI] [Google Scholar]
  • 50.Liu X., Wang L., Li L., Zhang X., Niu S. A Certificateless Anonymous Cross-Domain Authentication Scheme Assisted by Blockchain for Internet of Vehicles. Wirel. Commun. Mob. Comput. 2022;2022:3488977. doi: 10.1155/2022/3488977. [DOI] [Google Scholar]
  • 51.Yang X., Li S., Yang L., Du X., Wang C. Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme With Conditional Privacy Preservation for VANETs. IEEE Trans. Intell. Transp. Syst. 2024;25:12256–12268. doi: 10.1109/TITS.2024.3367925. [DOI] [Google Scholar]
  • 52.Ye X., Xu G., Cheng X., Li Y., Qin Z. Certificateless-Based Anonymous Authentication and Aggregate Signature Scheme for Vehicular Ad Hoc Networks. Wirel. Commun. Mob. Comput. 2021;2021:6677137. doi: 10.1155/2021/6677137. [DOI] [Google Scholar]
  • 53.Zhu F., Yi X., Abuadbba A., Khalil I., Huang X., Xu F. A security-enhanced certificateless conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 2023;24:10456–10466. doi: 10.1109/TITS.2023.3275077. [DOI] [Google Scholar]
  • 54.Tian J., Wang Y., Shen Y. A Security-Enhanced Certificateless Anonymous Authentication Scheme with High Computational Efficiency for Mobile Edge Computing. IEEE Trans. Netw. Serv. Manag. 2025;22:3555–3572. doi: 10.1109/TNSM.2025.3563637. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Data are contained within the article.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES