Publications-Theses
Article View/Open
Publication Export
-
Google ScholarTM
NCCU Library
Citation Infomation
Related Publications in TAIR
題名 應用於VANET之基於晶格條件隱私保護驗證協議
A Study on Lattice-based Conditional Privacy-Preserving Authentication in VANET作者 張雅筑
Zhang, Ya-Chu貢獻者 左瑞麟
Tso, Ray-Lin
張雅筑
Zhang, Ya-Chu關鍵詞 車載隨意行動網路
條件隱私保護驗證
抗量子攻擊
晶格
環簽章
VANET
Conditional Privacy-Preserving Authentication
Anti-Quantum
Lattice
Ring Signature日期 2024 上傳時間 5-Aug-2024 13:56:11 (UTC+8) 摘要 車載隨意行動網路(VANET)中的車輛在暴露通道上交換訊息,導致車輛及相關基礎設施容易受到各種威脅,甚至可能危害人身安全,因此身份驗證和隱私保護是VANET的關鍵需求。為解決該問題,Mundhe等人在2020年提出基於環簽章的條件隱私保護驗證(RCPPA)方案。但我們發現RCPPA具有潛在威脅,為此,我們提出新的基於晶格之條件隱私保護驗證方案,以解決RCPPA既有之安全性問題。我們所提出之基於晶格環簽章條件隱私保護驗證(LB-RCPPA)方案可以提供VANET中的車輛在不暴露真實身分的前提下,利用匿名驗證身份及訊息,以同時實現車輛隱私及責任歸咎,且LB-RCPPA具有抵抗量子攻擊的能力。此外,在隨機預言模型(ROM)下證明我們的方案可提供匿名性,對於自適應選擇訊息攻擊(EUF-CMA)具不可偽造性,且具不可否認性。
In vehicular ad hoc networks (VANETs), vehicles exchange messages over exposed channels, posing various threats to vehicles and related infrastructure, potentially jeopardizing personal safety. Therefore, identity authentication and privacy protection are critical requirements for VANETs. To address this issue, Mundhe et al. proposed the Ring-based Conditional Privacy-Preserving Authentication (RCPPA) scheme in 2020. However, we identified potential threats in RCPPA. In response, we propose a new lattice-based conditional privacy-preserving authentication scheme to address the security issues of RCPPA. Our proposed Lattice-based Ring-based Conditional Privacy-Preserving Authentication (LB-RCPPA) scheme allows vehicles in VANETs to utilize anonymous authentication of identity and messages without exposing real identities, thereby achieving both vehicle privacy and accountability. LB-RCPPA is also resistant to quantum attacks. Under the Random Oracle Model (ROM), we demonstrate that our scheme can provide anonymity, existential unforgeability under chosen message attack (EUF-CMA), and non-repudiation.參考文獻 [1] M Shahid Anwer and Chris Guy. A survey of vanet technologies. Journal of Emerging Trends in Computing and Information Sciences, 5(9):661–671, 2014. [2] Morteza M Zanjireh and Hadi Larijani. A survey on centralised and distributed clustering routing algorithms for wsns. In 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pages 1–6. IEEE, 2015. [3] Chai K Toh. Ad hoc mobile wireless networks: protocols and systems. Pearson Education, 2001. [4] Felipe Cunha, Leandro Villas, Azzedine Boukerche, Guilherme Maia, Aline Viana, Raquel AF Mini, and Antonio AF Loureiro. Data communication in vanets: Protocols, applications and challenges. Ad hoc networks, 44:90–103, 2016. [5] Christoph Sommer and Falko Dressler. Vehicular networking. Cambridge University Press, 2014. [6] Francisco J Martinez, Chai-Keong Toh, Juan-Carlos Cano, Carlos T Calafate, and Pietro Manzoni. Emergency services in future intelligent transportation systems based on vehicular communication networks. IEEE Intelligent Transportation Systems Magazine, 2(2):6–20, 2010. [7] Chai-Keong Toh. Future application scenarios for manet-based intelligent transportation systems. In Future generation communication and networking (fgcn 2007), volume 2, pages 414–417. IEEE, 2007. [8] Malalatiana Randriamasy, Adnane Cabani, Houcine Chafouk, and Guy Fremont. Geolocation process to perform the electronic toll collection using the its-g5 technology. IEEE Transactions on Vehicular Technology, 68(9):8570–8582, 2019. [9] Hassan Talat, Tuaha Nomani, Mujahid Mohsin, and Saira Sattar. A survey on location privacy techniques deployed in vehicular networks. In 2019 16th International Bhurban conference on applied sciences and technology (IBCAST), pages 604–613. IEEE, 2019. [10] Pravin Mundhe, Vijay Kumar Yadav, Abhishek Singh, Shekhar Verma, and S Venkatesan. Ring signature-based conditional privacy-preserving authentication in vanets. Wireless Personal Communications, 114:853–881, 2020. [11] SongShou Dong, YiHua Zhou, YuGuang Yang, and Yanqing Yao. A certificateless ring signature scheme based on lattice. Concurrency and Computation: Practice and Experience, 34(28):e7385, 2022. [12] Kübra Seyhan, Tu N Nguyen, Sedat Akleylek, Korhan Cengiz, and SK Hafızul Islam. Bi-gisis ke:modified key exchange protocol with reusable keys for iot security. Journal of Information Security and Applications, 58:102788, 2021. [13] Lily Chen, Lily Chen, Stephen Jordan, Yi-Kai Liu, Dustin Moody, Rene Peralta, Ray A Perlner, and Daniel Smith-Tone. Report on post-quantum cryptography, volume 12. US Department of Commerce, National Institute of Standards and Technology …, 2016. [14] Miklós Ajtai. Generating hard instances of the short basis problem. In Automata, Languages and Programming: 26th International Colloquium, ICALP’99 Prague, Czech Republic, July 11–15, 1999 Proceedings 26, pages 1–9. Springer, 1999. [15] Craig Gentry, Chris Peikert, and Vinod Vaikuntanathan. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the fortieth annual ACM symposium on Theory of computing, pages 197–206, 2008. [16] Zhengjun Jing, Chunsheng Gu, Zhimin Yu, Peizhong Shi, and Chongzhi Gao. Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement. Cluster Computing, 22:1717–1727, 2019. [17] Adeline Langlois and Damien Stehlé. Worst-case to average-case reductions for module lattices. Designs, Codes and Cryptography, 75(3):565–599, 2015. [18] Maxim Raya and Jean-Pierre Hubaux. Securing vehicular ad hoc networks. Journal of computer security, 15(1):39–68, 2007. [19] Rongxing Lu, Xiaodong Lin, Haojin Zhu, P-H Ho, and Xuemin Shen. Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications. In IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pages 1229–1237. IEEE, 2008. [20] Chenxi Zhang, Xiaodong Lin, Rongxing Lu, and P-H Ho. Raise: An efficient rsuaided message authentication scheme in vehicular communication networks. In 2008 IEEE international conference on communications, pages 1451–1457. IEEE, 2008. [21] Shi-Jinn Horng, Shiang-Feng Tzeng, Po-Hsian Huang, Xian Wang, Tianrui Li, and Muhammad Khurram Khan. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences, 317:48–66, 2015. [22] Qian Mei, Hu Xiong, Jinhao Chen, Minghao Yang, Saru Kumari, and Muhammad Khurram Khan. Efficient certificateless aggregate signature with conditional privacy preservation in iov. IEEE Systems Journal, 15(1):245–256, 2020. [23] Peter W Shor. Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings 35th annual symposium on foundations of computer science, pages 124–134. Ieee, 1994. [24] Sankar Mukherjee, Daya Sagar Gupta, and GP Biswas. An efficient and batch verifiable conditional privacy-preserving authentication scheme for vanets using lattice. Computing, 101(12):1763–1788, 2019. [25] Hui Liu, Yining Sun, Yan Xu, Rui Xu, and Zhuo Wei. A secure lattice-based anonymous authentication scheme for vanets. Journal of the Chinese Institute of Engineers, 42(1):66–73, 2019. [26] Dharminder Dharminder and Dheerendra Mishra. Lcppa: Lattice-based conditional privacy preserving authentication in vehicular communication. Transactions on Emerging Telecommunications Technologies, 31(2):e3810, 2020. [27] Zhengjun Jing, Chunsheng Gu, Zhimin Yu, Peizhong Shi, and Chongzhi Gao. Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement. Cluster Computing, 22:1717–1727, 2019. [28] Masahiro Yagisawa. Fully homomorphic encryption without bootstrapping. Cryptology ePrint Archive, 2015. [29] Adeline Langlois and Damien Stehlé. Worst-case to average-case reductions for module lattices. Designs, Codes and Cryptography, 75(3):565–599, 2015. [30] Jintai Ding, Pedro Branco, and Kevin Schmitt. Key exchange and authenticated key exchange with reusable keys based on rlwe assumption. Cryptology ePrint Archive, 2019. [31] Scott Fluhrer. Cryptanalysis of ring-lwe based key exchange with key share reuse. Cryptology ePrint Archive, 2016. [32] Jintai Ding, Saed Alsayigh, RV Saraswathy, Scott Fluhrer, and Xiaodong Lin. Leakage of signal function with reused keys in rlwe key exchange. In 2017 IEEE international conference on communications (ICC), pages 1–6. IEEE, 2017. [33] Jintai Ding, Scott Fluhrer, and Saraswathy Rv. Complete attack on rlwe key exchange with reused keys, without signal leakage. In Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings 23, pages 467–486. Springer, 2018. [34] Vadim Lyubashevsky. Lattice signatures without trapdoors. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 738–755. Springer, 2012. [35] Chaoyang Li, Yuan Tian, Xiubo Chen, and Jian Li. An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems. Information Sciences, 546:253–264, 2021. [36] YiHua Zhou, SongShou Dong, and YuGuang Yang. A unidirectional certificateless proxy re-signature scheme based on lattice. Transactions on Emerging Telecommunications Technologies, 33(4):e4412, 2022. [37] Javier Herranz and Germán Sáez. Forking lemmas for ring signature schemes. In International Conference on Cryptology in India, pages 266–279. Springer, 2003. [38] Yimin Wang, Hong Zhong, Yan Xu, and Jie Cui. Ecpb: efficient conditional privacy-preserving authentication scheme supporting batch verification for vanets. Int. J. Netw. Secur., 18(2):374–382, 2016. [39] Y Cui, L Cao, X Zhang, and G Zeng. Ring signature based on lattice and vanet privacy preservation. Chin. J. Comput, 40(169):1–14, 2017. [40] Jinhui Liu, Yong Yu, Jianwei Jia, Shijia Wang, Peiru Fan, Houzhen Wang, and Huan-guo Zhang. Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular ad-hoc networks. Tsinghua Science and Technology, 24(5):575–584, 2019. 描述 碩士
國立政治大學
資訊科學系碩士在職專班
111971001資料來源 http://thesis.lib.nccu.edu.tw/record/#G0111971001 資料類型 thesis dc.contributor.advisor 左瑞麟 zh_TW dc.contributor.advisor Tso, Ray-Lin en_US dc.contributor.author (Authors) 張雅筑 zh_TW dc.contributor.author (Authors) Zhang, Ya-Chu en_US dc.creator (作者) 張雅筑 zh_TW dc.creator (作者) Zhang, Ya-Chu en_US dc.date (日期) 2024 en_US dc.date.accessioned 5-Aug-2024 13:56:11 (UTC+8) - dc.date.available 5-Aug-2024 13:56:11 (UTC+8) - dc.date.issued (上傳時間) 5-Aug-2024 13:56:11 (UTC+8) - dc.identifier (Other Identifiers) G0111971001 en_US dc.identifier.uri (URI) https://nccur.lib.nccu.edu.tw/handle/140.119/152769 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 資訊科學系碩士在職專班 zh_TW dc.description (描述) 111971001 zh_TW dc.description.abstract (摘要) 車載隨意行動網路(VANET)中的車輛在暴露通道上交換訊息,導致車輛及相關基礎設施容易受到各種威脅,甚至可能危害人身安全,因此身份驗證和隱私保護是VANET的關鍵需求。為解決該問題,Mundhe等人在2020年提出基於環簽章的條件隱私保護驗證(RCPPA)方案。但我們發現RCPPA具有潛在威脅,為此,我們提出新的基於晶格之條件隱私保護驗證方案,以解決RCPPA既有之安全性問題。我們所提出之基於晶格環簽章條件隱私保護驗證(LB-RCPPA)方案可以提供VANET中的車輛在不暴露真實身分的前提下,利用匿名驗證身份及訊息,以同時實現車輛隱私及責任歸咎,且LB-RCPPA具有抵抗量子攻擊的能力。此外,在隨機預言模型(ROM)下證明我們的方案可提供匿名性,對於自適應選擇訊息攻擊(EUF-CMA)具不可偽造性,且具不可否認性。 zh_TW dc.description.abstract (摘要) In vehicular ad hoc networks (VANETs), vehicles exchange messages over exposed channels, posing various threats to vehicles and related infrastructure, potentially jeopardizing personal safety. Therefore, identity authentication and privacy protection are critical requirements for VANETs. To address this issue, Mundhe et al. proposed the Ring-based Conditional Privacy-Preserving Authentication (RCPPA) scheme in 2020. However, we identified potential threats in RCPPA. In response, we propose a new lattice-based conditional privacy-preserving authentication scheme to address the security issues of RCPPA. Our proposed Lattice-based Ring-based Conditional Privacy-Preserving Authentication (LB-RCPPA) scheme allows vehicles in VANETs to utilize anonymous authentication of identity and messages without exposing real identities, thereby achieving both vehicle privacy and accountability. LB-RCPPA is also resistant to quantum attacks. Under the Random Oracle Model (ROM), we demonstrate that our scheme can provide anonymity, existential unforgeability under chosen message attack (EUF-CMA), and non-repudiation. en_US dc.description.tableofcontents 1 Introduction 1 1.1 Background 1 1.2 Motivation and Contribution 3 1.3 Organization 5 2 Preliminaries 6 2.1 Lattice 6 2.2 Discrete Gaussian Distribution 6 2.3 Hard Problems on Lattice 7 2.4 Trapdoor and Basis Delegation Functions for Lattices 9 3 Related Work 11 3.1 Conditional Privacy-Preserving Authentication(CPPA) 11 3.2 Ring Signature-based Conditional Privacy-Preserving Authentication(RCPPA) 13 3.3 Certificateless Ring Signature Scheme Based on Lattice(L-CRSS) 17 3.4 Bi-GISIS-based Key Exchange(Bi-GISIS KE) 19 4 System Framework and Security Model 22 4.1 System Framework 22 4.2 Security Model 24 5 Proposed Scheme 26 5.1 Proposed Algorithm 30 5.2 Correctness 35 6 Security Analysis 38 7 Comparisons 47 8 Conclusions 48 Reference 49 zh_TW dc.format.extent 2355555 bytes - dc.format.mimetype application/pdf - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0111971001 en_US dc.subject (關鍵詞) 車載隨意行動網路 zh_TW dc.subject (關鍵詞) 條件隱私保護驗證 zh_TW dc.subject (關鍵詞) 抗量子攻擊 zh_TW dc.subject (關鍵詞) 晶格 zh_TW dc.subject (關鍵詞) 環簽章 zh_TW dc.subject (關鍵詞) VANET en_US dc.subject (關鍵詞) Conditional Privacy-Preserving Authentication en_US dc.subject (關鍵詞) Anti-Quantum en_US dc.subject (關鍵詞) Lattice en_US dc.subject (關鍵詞) Ring Signature en_US dc.title (題名) 應用於VANET之基於晶格條件隱私保護驗證協議 zh_TW dc.title (題名) A Study on Lattice-based Conditional Privacy-Preserving Authentication in VANET en_US dc.type (資料類型) thesis en_US dc.relation.reference (參考文獻) [1] M Shahid Anwer and Chris Guy. A survey of vanet technologies. Journal of Emerging Trends in Computing and Information Sciences, 5(9):661–671, 2014. [2] Morteza M Zanjireh and Hadi Larijani. A survey on centralised and distributed clustering routing algorithms for wsns. In 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pages 1–6. IEEE, 2015. [3] Chai K Toh. Ad hoc mobile wireless networks: protocols and systems. Pearson Education, 2001. [4] Felipe Cunha, Leandro Villas, Azzedine Boukerche, Guilherme Maia, Aline Viana, Raquel AF Mini, and Antonio AF Loureiro. Data communication in vanets: Protocols, applications and challenges. Ad hoc networks, 44:90–103, 2016. [5] Christoph Sommer and Falko Dressler. Vehicular networking. Cambridge University Press, 2014. [6] Francisco J Martinez, Chai-Keong Toh, Juan-Carlos Cano, Carlos T Calafate, and Pietro Manzoni. Emergency services in future intelligent transportation systems based on vehicular communication networks. IEEE Intelligent Transportation Systems Magazine, 2(2):6–20, 2010. [7] Chai-Keong Toh. Future application scenarios for manet-based intelligent transportation systems. In Future generation communication and networking (fgcn 2007), volume 2, pages 414–417. IEEE, 2007. [8] Malalatiana Randriamasy, Adnane Cabani, Houcine Chafouk, and Guy Fremont. Geolocation process to perform the electronic toll collection using the its-g5 technology. IEEE Transactions on Vehicular Technology, 68(9):8570–8582, 2019. [9] Hassan Talat, Tuaha Nomani, Mujahid Mohsin, and Saira Sattar. A survey on location privacy techniques deployed in vehicular networks. In 2019 16th International Bhurban conference on applied sciences and technology (IBCAST), pages 604–613. IEEE, 2019. [10] Pravin Mundhe, Vijay Kumar Yadav, Abhishek Singh, Shekhar Verma, and S Venkatesan. Ring signature-based conditional privacy-preserving authentication in vanets. Wireless Personal Communications, 114:853–881, 2020. [11] SongShou Dong, YiHua Zhou, YuGuang Yang, and Yanqing Yao. A certificateless ring signature scheme based on lattice. Concurrency and Computation: Practice and Experience, 34(28):e7385, 2022. [12] Kübra Seyhan, Tu N Nguyen, Sedat Akleylek, Korhan Cengiz, and SK Hafızul Islam. Bi-gisis ke:modified key exchange protocol with reusable keys for iot security. Journal of Information Security and Applications, 58:102788, 2021. [13] Lily Chen, Lily Chen, Stephen Jordan, Yi-Kai Liu, Dustin Moody, Rene Peralta, Ray A Perlner, and Daniel Smith-Tone. Report on post-quantum cryptography, volume 12. US Department of Commerce, National Institute of Standards and Technology …, 2016. [14] Miklós Ajtai. Generating hard instances of the short basis problem. In Automata, Languages and Programming: 26th International Colloquium, ICALP’99 Prague, Czech Republic, July 11–15, 1999 Proceedings 26, pages 1–9. Springer, 1999. [15] Craig Gentry, Chris Peikert, and Vinod Vaikuntanathan. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the fortieth annual ACM symposium on Theory of computing, pages 197–206, 2008. [16] Zhengjun Jing, Chunsheng Gu, Zhimin Yu, Peizhong Shi, and Chongzhi Gao. Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement. Cluster Computing, 22:1717–1727, 2019. [17] Adeline Langlois and Damien Stehlé. Worst-case to average-case reductions for module lattices. Designs, Codes and Cryptography, 75(3):565–599, 2015. [18] Maxim Raya and Jean-Pierre Hubaux. Securing vehicular ad hoc networks. Journal of computer security, 15(1):39–68, 2007. [19] Rongxing Lu, Xiaodong Lin, Haojin Zhu, P-H Ho, and Xuemin Shen. Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications. In IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pages 1229–1237. IEEE, 2008. [20] Chenxi Zhang, Xiaodong Lin, Rongxing Lu, and P-H Ho. Raise: An efficient rsuaided message authentication scheme in vehicular communication networks. In 2008 IEEE international conference on communications, pages 1451–1457. IEEE, 2008. [21] Shi-Jinn Horng, Shiang-Feng Tzeng, Po-Hsian Huang, Xian Wang, Tianrui Li, and Muhammad Khurram Khan. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences, 317:48–66, 2015. [22] Qian Mei, Hu Xiong, Jinhao Chen, Minghao Yang, Saru Kumari, and Muhammad Khurram Khan. Efficient certificateless aggregate signature with conditional privacy preservation in iov. IEEE Systems Journal, 15(1):245–256, 2020. [23] Peter W Shor. Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings 35th annual symposium on foundations of computer science, pages 124–134. Ieee, 1994. [24] Sankar Mukherjee, Daya Sagar Gupta, and GP Biswas. An efficient and batch verifiable conditional privacy-preserving authentication scheme for vanets using lattice. Computing, 101(12):1763–1788, 2019. [25] Hui Liu, Yining Sun, Yan Xu, Rui Xu, and Zhuo Wei. A secure lattice-based anonymous authentication scheme for vanets. Journal of the Chinese Institute of Engineers, 42(1):66–73, 2019. [26] Dharminder Dharminder and Dheerendra Mishra. Lcppa: Lattice-based conditional privacy preserving authentication in vehicular communication. Transactions on Emerging Telecommunications Technologies, 31(2):e3810, 2020. [27] Zhengjun Jing, Chunsheng Gu, Zhimin Yu, Peizhong Shi, and Chongzhi Gao. Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement. Cluster Computing, 22:1717–1727, 2019. [28] Masahiro Yagisawa. Fully homomorphic encryption without bootstrapping. Cryptology ePrint Archive, 2015. [29] Adeline Langlois and Damien Stehlé. Worst-case to average-case reductions for module lattices. Designs, Codes and Cryptography, 75(3):565–599, 2015. [30] Jintai Ding, Pedro Branco, and Kevin Schmitt. Key exchange and authenticated key exchange with reusable keys based on rlwe assumption. Cryptology ePrint Archive, 2019. [31] Scott Fluhrer. Cryptanalysis of ring-lwe based key exchange with key share reuse. Cryptology ePrint Archive, 2016. [32] Jintai Ding, Saed Alsayigh, RV Saraswathy, Scott Fluhrer, and Xiaodong Lin. Leakage of signal function with reused keys in rlwe key exchange. In 2017 IEEE international conference on communications (ICC), pages 1–6. IEEE, 2017. [33] Jintai Ding, Scott Fluhrer, and Saraswathy Rv. Complete attack on rlwe key exchange with reused keys, without signal leakage. In Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings 23, pages 467–486. Springer, 2018. [34] Vadim Lyubashevsky. Lattice signatures without trapdoors. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 738–755. Springer, 2012. [35] Chaoyang Li, Yuan Tian, Xiubo Chen, and Jian Li. An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems. Information Sciences, 546:253–264, 2021. [36] YiHua Zhou, SongShou Dong, and YuGuang Yang. A unidirectional certificateless proxy re-signature scheme based on lattice. Transactions on Emerging Telecommunications Technologies, 33(4):e4412, 2022. [37] Javier Herranz and Germán Sáez. Forking lemmas for ring signature schemes. In International Conference on Cryptology in India, pages 266–279. Springer, 2003. [38] Yimin Wang, Hong Zhong, Yan Xu, and Jie Cui. Ecpb: efficient conditional privacy-preserving authentication scheme supporting batch verification for vanets. Int. J. Netw. Secur., 18(2):374–382, 2016. [39] Y Cui, L Cao, X Zhang, and G Zeng. Ring signature based on lattice and vanet privacy preservation. Chin. J. Comput, 40(169):1–14, 2017. [40] Jinhui Liu, Yong Yu, Jianwei Jia, Shijia Wang, Peiru Fan, Houzhen Wang, and Huan-guo Zhang. Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular ad-hoc networks. Tsinghua Science and Technology, 24(5):575–584, 2019. zh_TW