Abstract
SignCryption is the public-key cryptographic tool to guarantee various security paradigms by integrating digital signature and encryption. The traditional digital signature with encryption is very expensive as it requires massive computational overheads. Instead signcryption combines these two into one step, and overhead reduced is significantly observable. Proxy re-encryption is a technique in which a proxy enables a third person Chris to be able to decrypt a message which was sent by Alice for Bob. Instead of first signing and then encrypting, we are sending after just signcrypting the message into the network where proxy will re-encrypt it at the receiver end. We have used Bilinear Diffie-Hellman assumption, i.e., irreversible property of Diffie–Hellman assumption in bilinear groups with digital signatures to provide confidentiality, integrity, and non-repudiation. Later the result is evaluated using AVISPA, Automated Validation of Internet Security Protocols and Applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu, X., et al.: SEMD: secure and efficient message dissemination with policy enforcement in VANET. J. Comput. Syst. Sci. (2016)
Patel, N.J., Jhaveri, R.H.: Trust based approaches for secure routing in VANET: a survey. Procedia Comput. Sci. 45, 592–601 (2015)
Kanchan, S., Chaudhari, N.S.: Integrating Group Signature scheme with Non-transitive Proxy Re-encryption in VANET (forthcoming)
Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56, 3442–3456 (2007)
Ma, C., Ao, J.: Group-based proxy re-encryption scheme. In: International Conference on Intelligent Computing, pp. 1025–1034 (2009)
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg (1998)
Ivan, A.-A., Dodis, Y.: Proxy Cryptography Revisited. In: NDSS (2003)
Vijayan, R., Singh, S.: A novel approach for implementing security over vehicular ad hoc network using signcryption through network grid. Int. J. Adv. Comput. Sci. Appl. 2(4) (2011)
Singh, S., Vijayan, R.: Enhanced security for information flow in vanet using signcryption and trust level. Int. J. Comput. Appl. 16(5), 13–18 (2011)
Fu, X.: Unidirectional proxy re-encryption for access structure transformation in attribute-based encryption schemes. Int. J. Netw. Secur. 142 (2005)
Von Oheimb, D.: The high-level protocol specification language HLPSL developed in the EU project AVISPA. In: Proceedings of APPSEM 2005 Workshop (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kanchan, S., Chaudhari, N.S. (2019). Signcrypting the Group Signature with Non-transitive Proxy Re-encryption in VANET. In: Sa, P., Bakshi, S., Hatzilygeroudis, I., Sahoo, M. (eds) Recent Findings in Intelligent Computing Techniques . Advances in Intelligent Systems and Computing, vol 707. Springer, Singapore. https://doi.org/10.1007/978-981-10-8639-7_2
Download citation
DOI: https://doi.org/10.1007/978-981-10-8639-7_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8638-0
Online ISBN: 978-981-10-8639-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)