et al., 2008) (Martucci et al., 2008) . Our proposed
solution avoids these complexities by enforcing the
limitation of one pseudonym per vehicle per epoch,
binding it to the current epoch and the vehicle’s se-
cret key which is included in the delegated creden-
tial. Consequently, only one valid pseudonym can be
generated per epoch, and verifiers can readily validate
and ensure the Sybil-freeness of received pseudonyms
without relying on third-party interactions.
8 CONCLUSIONS & FUTURE
WORK
This paper addresses the complex privacy and secu-
rity challenges in VANETs, particularly in vehicle
renting scenarios. It successfully bridges a signif-
icant gap in existing research by proposing a non-
interactive, privacy-preserving authentication scheme
that ensures the privacy of both vehicle owners and
renters. This work not only enhances the security
framework of VANETs but also adapts to the evolv-
ing landscape of vehicle sharing and renting, marking
a considerable step forward in the practical applica-
tion of VANET technologies. The paper fulfills all the
privacy and security requirements listed in 3.2. The
performance evaluation shows that the time taken to
send and verify proofs in this system is feasible, mak-
ing it possible to adopt in real-world transportation
systems. This authentication scheme also holds po-
tential for broader applications beyond VANETs, par-
ticularly in smart environments and IoT ecosystems,
where similar privacy and security concerns exist. As
future work, we plan to address the limitation of this
system, where we need to trust the vehicle to remove
credentials after it is turned off every time. We can
circumvent this by setting an end time for each dele-
gated credential or changing the delegation process to
include a signature from the driver, which would only
be valid for the duration of the drive.
REFERENCES
Akil, M., Islami, L., Fischer-H
¨
ubner, S., Martucci, L. A.,
and Zuccato, A. (2020). Privacy-preserving identifiers
for iot: a systematic literature review. IEEE Access,
8:168470–168485.
Akil, M., Martucci, L., and Hoepman, J.-H. (2023a). Non-
interactive privacy-preserving sybil-free authentica-
tion scheme in vanets. In Network and DistributedSys-
tem Security (NDSS) Symposium.
Akil, M., Naskar, S., Martucci, L., and Hoepman, J.-
H. (2023b). A privacy-preserving approach to vehi-
clerenting and driver accountability in vanets. In 18th
IFIP Summer School on Privacy and Identity Manage-
ment 2023-Sharing (in) a Digital World. OSLO August
7-13, 2023.
Amara, M. and Siad, A. (2011). Elliptic curve cryptogra-
phy and its applications. In International workshop
on systems, signal processing and their applications,
WOSSPA, pages 247–250. IEEE.
Andersson, C., Kohlweiss, M., Martucci, L. A., and
Panchenko, A. (2008). A self-certified and sybil-
free framework for secure digital identity domain
buildup. In Information Security Theory and Prac-
tices. Smart Devices, Convergence and Next Genera-
tion Networks: Second IFIP WG 11.2 International
Workshop, WISTP 2008, Seville, Spain, May 13-16,
2008. Proceedings 2, pages 64–77. Springer.
Barreto, P. S. and Naehrig, M. (2005). Pairing-friendly el-
liptic curves of prime order. In International work-
shop on selected areas in cryptography, pages 319–
331. Springer.
Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M.,
Lysyanskaya, A., and Shacham, H. (2009). Random-
izable proofs and delegatable anonymous credentials.
In Advances in Cryptology-CRYPTO 2009: 29th An-
nual International Cryptology Conference, Santa Bar-
bara, CA, USA, August 16-20, 2009. Proceedings,
pages 108–125. Springer.
Brecht, B., Therriault, D., Weimerskirch, A., Whyte, W.,
Kumar, V., Hehn, T., and Goudy, R. (2018). A secu-
rity credential management system for v2x communi-
cations. IEEE Transactions on Intelligent Transporta-
tion Systems, 19(12):3850–3871.
Camenisch, J., Drijvers, M., and Dubovitskaya, M. (2017).
Practical uc-secure delegatable credentials with at-
tributes and their application to blockchain. In Pro-
ceedings of the 2017 ACM SIGSAC Conference on
Computer and Communications Security, pages 683–
699.
Camenisch, J. et al. (2010). Specification of the identity
mixer cryptographic library, version 2.3.1, 2010.
Camenisch, J., Kiayias, A., and Yung, M. (2009). On the
portability of generalized schnorr proofs. In Annual
International Conference on the Theory and Appli-
cations of Cryptographic Techniques, pages 425–442.
Springer.
Camenisch, J. and Shoup, V. (2003). Practical verifiable
encryption and decryption of discrete logarithms. In
Annual International Cryptology Conference, pages
126–144. Springer.
Camenisch, J. and Stadler, M. (1997). Efficient group signa-
ture schemes for large groups. In Annual international
cryptology conference, pages 410–424. Springer.
Chaum, D. (1985). Security without identification: Trans-
action systems to make big brother obsolete. Commu-
nications of the ACM, 28(10):1030–1044.
Engoulou, R. G., Bella
¨
ıche, M., Pierre, S., and Quintero, A.
(2014). Vanet security surveys. Computer Communi-
cations, 44:1–13.
Fiat, A. and Shamir, A. (1986). How to prove your-
self: Practical solutions to identification and signature
SECRYPT 2024 - 21st International Conference on Security and Cryptography
126