Cryptology ePrint Archive: Report 2018/089

The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications

Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Marcos Vinicius M. Silva

Abstract: Security and privacy are important requirements for the broad deployment of intelligent transportation systems (ITS). This motivated the development of many proposals aimed at creating a Vehicular Public Key Infrastructure (VPKI) for addressing such needs. Among them, schemes based on pseudonym certificates are considered particularly prominent: they provide data authentication in a privacy-preserving manner while allowing vehicles to be revoked in case of misbehavior. Indeed, this is the approach followed by the Security Credential Management System (SCMS), one of the leading candidate designs for protecting vehicular communications in the United States. Despite SCMS's appealing design, in this article we show that it still can be further improved. Namely, one of the main benefits of SCMS is its so-called butterfly key expansion process, which allows batches of pseudonym certificates to be issued for authorized vehicles by means of a single request. Whereas this procedure requires the vehicle to provide two separate public/private key pairs for registration authorities, we present a modified protocol that uses a single key for the same purpose. As a result, the processing and bandwidth costs of the certificate provisioning protocol drop as far as 50%. Such performance gains come with no negative impact in terms of security, flexibility or scalability when compared to the original SCMS.

Category / Keywords: cryptographic protocols / Vehicular communications, security and privacy, pseudonym certificates, butterfly key expansion, Security Credential Management System (SCMS)

Original Publication (with minor differences): IEEE VNC 2018

Date: received 23 Jan 2018, last revised 14 Oct 2018

Contact author: mjunior at larc usp br

Available format(s): PDF | BibTeX Citation

Note: Some minor text revisions were made to remove typos and broken references. Background info was also shortened for a more "straight to the point" discussion.

Version: 20181014:202229 (All versions of this report)

Short URL: ia.cr/2018/089


[ Cryptology ePrint archive ]