Group Signature-Based Vehicular PKI Without Thousands of Pseudonym Certificates
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Computer Science and Electronics Engineering (IJCSEE) Volume 4, Issue 3 (2016) ISSN 2320–4028 (Online) Group Signature-based Vehicular PKI without Thousands of Pseudonym Certificates Sokjoon Lee, Hyeok Chan Kwon and Byung Ho Chung communication and its related security technologies. Abstract—V2V(Vehicle-to-Vehicle) communication is a To make V2V message trusted and verifiable, vehicular PKI technology to reduce auto accidents through information or V-PKI that can issue and manage digital certificate is exchange among cars in road such as road status, traffic jam, necessary. SCMS(Security Credential Management System) driving data, etc. To make V2V message trusted and verifiable, [6, 7] was proposed for V-PKI. In this system, pseudonym vehicular PKI or V-PKI that can issue and manage digital certificate is certificates are used to prevent tracking for user privacy. 3,120 necessary. SCMS(Security Credential Management System)[6, 7] was short term pseudonym certificates per OBE should be issued for proposed for V-PKI. In this system, thousands of pseudonym certificates are used to prevent tracking for user privacy, but there are three years. In this case, there are two problems. The first two problems. The first problem is that the private keys with 3,120 problem is that the private keys with 3,120 pseudonym pseudonym certificates should be kept and used timely in HSM of the certificates should be kept and used timely in HSM of the OBU. OBU. The second problem is that thousands certificates and privacy The second problem is that thousands certificates and privacy keys should be re-issued if they are exhausted after three years. keys should be re-issued if they are exhausted after three years. In order to solve these problems, we propose vehicular PKI based In order to solve these problems, we propose group on group signature. We use the group signature with controllable linkability[3] to link the transactions from the same OBU in short signature-based vehicular PKI. We use the group signature term, but all transactions from the same OBU would not be linked for with controllable linkability to link the transactions from the long period. The key management in HSM of the OBU would be easier same OBU in short term, but all transactions from the same and the OBU request only one private key after the valid period with OBU would not be linked for long period. Only one private key our proposal. is used in the valid period if the key is not revoked. In this case, there are advantages that the management in HSM of the OBU Keywords—Group signature, SCMS, vehicular PKI and V2V would be easier and that the OBU request only one private key communication security after the valid period. I. INTRODUCTION II. BACKGROUND 2V(Vehicle-to-Vehicle) communication is a technology to V reduce auto accidents through information exchange A. Security Credential Management System (SCMS) among cars in road such as road status, traffic jam, driving V2V communication to send and receive Basic Safety data, etc. It is a part of ITS(Intelligent Transportation Systems) Messages (BSMs) can be used to reduce traffic accidents. To applied worldwide since the late 1990s. ITS is the enhanced prevent attacks using the forged message, V2V message should transportation system with automated operation and be verified and authenticated using digital signatures. In that management by applying electronic control and information case, PKI is needed to make trust relation with the signer of the communication technology to traffic mechanism and verified signatures. But it is not desirable that all signatures infrastructure. But it would be possible to forge or exploit V2V from the same OBU is generated using the same certificate and communication message to cause severe traffic congestion or private key because of tracking issue. accidents if security technology is not applied to ITS. Therefore Security Credential Management System or SCMS is many companies, projects, and SDOs are developing V2V developed and proposed for vehicular PKI with these requirements. It provides privacy against insiders and outsiders Sokjoon Lee is with Electronics and Telecommunication Research Institute, using separation of SCMS duties and information. Fig. 1 shows Daejeon, South Korea (corresponding author to provide phone: the structure of SCMS. +82-42-860-5455; fax: +82-42-860-1471; e-mail: [email protected]). In SCMS, each OBU need 20 pseudonym certificates per Hyeok-Chan Kwon is also with Electronics and Telecommunication Research Institute, Daejeon, South Korea (e-mail: [email protected]). week or 3,120 certificates for three years. The private keys to be Byung Ho Chung is also with Electronics and Telecommunication Research used in generating the digital signatures are also necessary and Institute, Daejeon, South Korea (e-mail: [email protected]). This work was supported by Institute for Information & communications they should be saved at the safe hardware such as HSM or TPM Technology Promotion(IITP) grant funded by the Korea government(MSIP) [5]. Many OBU vendors are adapting HSM to save private keys (No.R-20160226-002842, Development of V2X Service Integrated Security and generate the signatures securely. In that case, 3,120 keys Technology for Autonomous Driving Vehicle) 157 International Journal of Computer Science and Electronics Engineering (IJCSEE) Volume 4, Issue 3 (2016) ISSN 2320–4028 (Online) are managed properly in HSM and should be selected and used request the new 3,120 pairs for the next three years. On issuing, timely. The pseudonym certificates and keys are rotated every 5 the private/public key generation and PoP(Possession of minutes and should be chosen dynamically. This can make the Private key) process for 3,120 pairs is necessary but this process management for certificate and private key pairs difficult. is very heavy for HSM. Another problem occurs when all certificate and key pairs are exhausted after three years. In that case, OBU should Fig. 1 Structure of SCMS key or opening key) and kik(issuing key). A part of gsk can be considered as the user’s anonymous identifier, because the B. Group Signatures value will be opened when the anonymous user should be User privacy is a significant requirement in vehicular PKI. identified. For privacy, cryptographic anonymous signatures can be considered. Group signature is a mechanism which can provide C. PKI Based on Group Signature anonymity using a group public key. A participant of the group Group signature is just one of digital signature scheme. has its own private key and makes signature for authentication. Therefore, if V2V message is verified and authenticated using The signature can then be verified with one group public key. group signature, PKI is also necessary to provide trust relation, The verifier just knows the correctness of the signature. like SCMS. Benjumea et al[1] extended the semantic of X.509 Boneh et al[2] proposed short group signatures, mentioning certificates to use anonymous signature scheme. Lee et al[4] that one application of their work could be Vehicle Safety proposed privacy-preserving PKI based on group signature. Communication (VSC) system. With this, there is no method to Any user in group signature belongs to one or more groups. link any two or more messages without opening. A group identifier may be allocated to the group to represent it. There are four types of keys including gsk(user’s private Thus, group certificate is defined as an electronic document key), gpk(group public key), gmsk(group manager’s private which uses a group signature to bind together a group public 158 International Journal of Computer Science and Electronics Engineering (IJCSEE) Volume 4, Issue 3 (2016) ISSN 2320–4028 (Online) key with the group identifier. All members has the same group CA using the conventional digital signature, such as RSA or certificate, but they have different private key. This design ECDSA. principle is shown in Fig. 2. The certificate can be signed by Fig. 2 Design Principle of PKI Based on Group Signature with the revocation list. III. V-PKI USING GROUP SIGNATURE But the revocation check in V-PKI with group signature is different. There’s no information on the group certificate or A. Configuration & Operations signature to identify OBU. Boneh et al’s group signature use In SCMS, thousands of pseudonym certificates should be key update method. When a key is revoked, all private key and issued to one OBU in order that the vehicle with the OBU could group public key should be updated. This method is very not tracked. But, in group signatures, it is unnecessary to have inefficient to be used in V-PKI. many pseudonym certificate because linking messages from the There is another revocation check method, similar with same OBU (with the same private key) is impossible. CRL-based one. In VLR(Verifier-Local Revocation) method, There are two types of CA or management server. The first revocation list will be sent to verifiers and there’s no need to CA is for issuing the private key of OBU using its issuing key. update keys. Some group signatures provides inefficient VLR This CA can check the OBU’s ID when issuing the key. The method. second CA is for opening the member’s gsk or identity using group manager’s private key when the message is problematic. C.V-PKI with CL-GS The group certificate is issued by one of the CAs or through Hwang et al[3] proposed the group signature with their cooperation. controllable linkability. In this scheme, there is another type of - Issuing CA: the first CA that can issue group certificate key – linking key. The OBU with linking key can link the and generate private key of OBU.