Paper 2024/1674

Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard

Alexandra Boldyreva, Georgia Institute of Technology
Virendra Kumar, Qualcomm (United States)
Jiahao Sun
Abstract

The paper provides the first provable security analysis of the Butterfly Key Mechanism (BKM) protocol from IEEE 1609.2.1 standard. The BKM protocol specifies a novel approach for efficiently requesting multiple certificates for use in vehicle-to-everything (V2X) communication. We define the main security goals of BKM, such as vehicle privacy and communication authenticity. We prove that the BKM protocol, with small modifications, meets those security goals. We also propose a way to significantly improve the protocol's efficiency without sacrificing security.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Minor revision. PETS 2024
Keywords
V2VV2Xprotocolauthenticationprivacykey generation
Contact author(s)
sasha @ gatech edu
virendra @ qti qualcomm com
History
2024-10-18: approved
2024-10-15: received
See all versions
Short URL
https://ia.cr/2024/1674
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1674,
      author = {Alexandra Boldyreva and Virendra Kumar and Jiahao Sun},
      title = {Provable Security Analysis of Butterfly Key Mechanism Protocol in {IEEE} 1609.2.1 Standard},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1674},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1674}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.