iconOpen Access

ARTICLE

A Distributed Anonymous Reputation System for V2X Communication

Shahidatul Sadiah1,#, Toru Nakanishi2,#,*

1 Faculty of Electrical Engineering, Universiti Teknologi Malaysia, Johor Bahru, 81310, Malaysia
2 Graduate School of Advanced Science and Engineering, Hiroshima University, Higashi-Hiroshima, 739-8527, Japan

* Corresponding Author: Toru Nakanishi. Email: email
# These authors contributed equally to this work

(This article belongs to the Special Issue: Advances in IoT Security: Challenges, Solutions, and Future Applications)

Computers, Materials & Continua 2026, 87(1), 41 https://doi.org/10.32604/cmc.2025.073774

Abstract

V2X communication enables vehicles to share real-time traffic and road-condition data, but binding messages to persistent identifiers enables location tracking. Furthermore, since forged reports from malicious vehicles can distort trust decisions and threaten road safety, privacy-preserving trust management is essential. Lu et al. previously presented BARS, an anonymous reputation mechanism founded on blockchain technology to establish a privacy-preserving trust architecture for V2X communication. In this system, reputation certificates without a vehicle identifier ensure anonymity, while two authorities jointly manage certificate issuance and reputation updates. However, the centralized certificate updates introduce scalability limitations, and the authorities can trace vehicle behavioral information, which threatens privacy guarantees. Several subsequent systems derived from BARS still rely on centralized certificate management and are subject to authority-side privacy leakage. As a result, a key challenge in this line of research remains unresolved: how to decentralize the certificate-update process while preserving privacy against the authorities in privacy-preserving V2X trust management. In this paper, we propose a distributed anonymous reputation system for V2X communication, based on an anonymous reputation system for crowdsensing. In our proposed system for V2X communication, the server is distributed to a certificate authority (CA) and roadside units (RSUs). Each vehicle shows the reputation level to the nearest RSU at the beginning of each time interval, and registers a short-time public key. In the interval, the messages from the vehicle are authenticated under the public key and are scored. At the end of the interval, the nearest RSU updates the certificate anonymously. Our solution decentralizes the certificate-update process by assigning each update to the nearest RSU. A zero-knowledge-proof-based show protocol removes the need for any central authority to handle vehicle certificates and thus prevents the authorities from tracing vehicle activities. Compared with BARS, where centralized authorities must update the reputation certificates of many vehicles and may incur communication and processing delays, our system performs each update locally at the nearest RSU once per interval. The required interaction consists only of a few kilobytes of communication and a zero-knowledge proof that is almost fully precomputed on the vehicle side, while the RSU-side processing is estimated to take about 40 ms based on timing measurements of the underlying cryptographic operations. This distributed update model avoids the centralized bottleneck of BARS and simultaneously removes the privacy risk arising from authority collusion.

Keywords

V2X communication; anonymous reputation system; proof of knowledge

1  Introduction

The privacy of one’s location is a major concern, especially for drivers. However, real-time local information, such as traffic and road conditions, is essential for efficient urban management. Therefore, it is critical to collect and share such local information while respecting privacy. Consider a scenario in which vehicles collect local information and exchange it via V2X communication, such as V2V and V2I. To deter message tampering and impersonation, messages from each vehicle should be authenticated. Nevertheless, since location can often be inferred from both the reported content and authentication metadata, linking authenticated messages to persistent vehicle identities can violate privacy.

V2X communication faces significant challenges due to its open and decentralized nature. When malicious vehicles disseminate falsified data, they undermine both the reliability of information exchange and the safety of ordinary drivers. Consequently, trust evaluation and management in V2X communication has attracted significant attention in recent years.

1.1 Previous Works

Vehicle ad-hoc network (VANET) reputation systems have been studied in the literature, but most approaches do not consider the privacy aspect of vehicles (e.g., [13]). These studies mainly focus on frameworks for evaluating vehicle behavior and message forwarding to detect misbehavior. In contrast, in the context of crowdsensing, a privacy-aware reputation system called ARTSense was proposed in [4]. In crowdsensing, numerous mobile users voluntarily collect sensing data, such as location and environmental information, which are submitted to and analyzed by a centralized server. Therefore, user privacy must be taken into account. To achieve the anonymity of users, ARTSense separates the data reporting process from the reputation updating process. No user identity information is revealed in individual sensing reports. Furthermore, the server cannot link multiple reports to the same participant due to the use of blind IDs. However, this work is not designed for V2X communication, which is characterized by high mobility and a dynamic network topology.

In 2016, Jaimes et al. [5] proposed a centralized anonymous reputation system (ARS) for V2X communication, including VANETs, in which vehicles interact with roadside units (RSUs) to submit feedback to a centralized reputation server (RepS) and to retrieve their current reputation levels under pseudonyms. The server updates the reputation level of each vehicle by associating anonymous identities with real identities. ARS introduced the notion of security states, which can help identify region-specific risks and support the evaluation of neighboring vehicles’ reputation scores. The reputation level of a vehicle is the result of the aggregation of the reputation levels by the characteristics of generation and forwarding of messages. However, the centralized server causes the bottleneck in scalability, single point of failure, and privacy risk that the server can reveal the location history of vehicle.

In 2018, Lu et al. [6] proposed a blockchain-based anonymous reputation system (BARS) to establish a privacy-preserving trust model for V2X communication. In this system, a certificate authority (CA) issues certificates to vehicles and manages revocation. All activities of CA are recorded on the blockchain for transparency. The certificate includes no vehicle ID and is thus anonymous. On the other hand, a law enforcement authority (LEA) is responsible for managing the correspondence between public keys and real identities. In case of disputes, the LEA can trace a vehicle from a public key used for authentication. Furthermore, BARS incorporates a reputation system in which the LEA monitors and evaluates each vehicle’s behavior, and updates its reputation score. The reputation is certified by the certificate, and updated by the CA with the assistance of the LEA. The reputation system is anonymous due to the hidden vehicle’s ID. However, the two authorities CA and LEA cooperatively update the certificate of each vehicle. Thus, when lots of vehicles communicate messages, the centralized update process can become a bottleneck, i.e., BARS also have a scalability disadvantage. In addition, if the two authorities collude, they may reveal the location history of a vehicle.

1.2 Our Contributions

In this paper, toward a distributed privacy-preserving trust management in V2X communication, we propose an anonymous reputation system for V2X communication, which is derived from an anonymous reputation system for crowdsensing [7]. In the system for crowdsensing, the server updates the reputation certificate of each user s.t. the user’s ID and even the reputation value are hidden. Using a zero-knowledge proof (ZKP), the user can prove the reputation level (an integer range that contains the reputation value). In our proposed system for V2X communication, the server is distributed across CA and RSUs (roadside units). Each vehicle shows the reputation level to the nearest RSU at the beginning of each time interval, similarly to the underlying system [7], and registers a short-time public key. In the interval, the messages from the vehicle are authenticated under the public key and are scored. At the end of the interval, the nearest RSU updates the certificate anonymously.

To situate our contributions within existing approaches, Table 1 summarizes the difference in the architecture, anonymity, and costs across ARS, BARS, and our proposed system. This distributed update in our system avoids the centralized certificate-update process in BARS [6], where two central authorities must update the certificates of many vehicles, potentially causing communication and processing delays. In our system, each update is performed locally at the nearest RSU once per interval, requiring only a few kilobytes of communication and a zero-knowledge proof that is almost fully precomputed on the vehicle side, with the RSU-side processing estimated to take about 40 ms based on timing measurements of the underlying cryptographic operations. This distributed mechanism removes the centralized bottleneck of BARS and mitigates the privacy risk arising from possible authority collusion. Per-message authentication during the interval uses the same pseudonym-certificate mechanism as in existing RSU-assisted V2X systems, and ZKPs are required only once per interval; detailed efficiency considerations are discussed in Section 6. From these efficiency considerations, we consider that the practicality of the proposed system is demonstrated without requiring mobility-level simulations. Network-level performance evaluations under specific traffic and mobility models (e.g., NS-3 or SUMO) are important as complementary research directions that depend on application scenarios. We therefore leave such system-level evaluations as future work.

images

In our system, a malicious vehicle cannot be traced by authorities such as the LEA. However, the vehicle can be scored low in the anonymous reputation system, and the messages can be flagged as untrustworthy. The secret key of each RSU is unique, and thus a compromised RSU must also be revoked. The revocation is done using a complete subtree (CS) method [8] to compute revocation information for RSUs. In this paper, we do not address blockchain-based transparency, and the detailed reputation evaluation algorithm for scoring is also beyond the scope of our study. While both components are essential for constructing a complete and practical V2X trust management system, they are conceptually separable from the fundamental challenge we focus on in this research line. Since our main contribution is the distributed certificate-update mechanism with zero-knowledge-proof-based privacy protection, the practical evaluation presented in Section 6 concentrates on this fully specified component. The integration of more sophisticated reputation evaluation algorithms and scalable blockchain-based transparency mechanisms, which may require additional cryptographic and system-level design considerations, is left as future work.

1.3 Difference from the Conference Version [9]

A preliminary version of this paper was presented in ICCE 2024 [9], where security requirements are informally defined, and only the proof sketches for the security requirements are shown. In this paper, we formally show game-based security definitions, and prove the security based on the definitions. Furthermore, we extend the original system [9] by adding a revocation function for malicious RSUs, and we newly provide a detailed efficiency evaluation of the system.

1.4 Related Works

The recent works related to BARS and our proposed system are as follows.

In [10], Ahmed et al. propose a privacy-enhancing V2X trust management system that combines pseudo-identity–based anonymous authentication with blockchain-based revocation, similar to BARS. Compared with BARS, it integrates a more sophisticated context-aware trust (reputation) computation and improves verification efficiency through signature aggregation. However, the scheme relies on a fully trusted TA (Trusted Authority) that centrally generates and manages each vehicle’s pseudo-identities and secret keys, and thus TA can compromise user’s privacy by de-anonymization, as in BARS.

In [11], Feng et al. propose a blockchain-based privacy-preserving authentication system for V2X environments. The system adopts a structure similar to BARS by introducing two ID management entities and realizing vehicle anonymity through pseudonym-based public-key certificates. In addition, the system employs an asynchronous accumulator that is a hash-tree-based mechanism, to accelerate revocation verification. However, this approach focuses solely on authentication and revocation, and thus does not incorporate a reputation-based trust management mechanism. Moreover, if the two management entities collude, the linkage of pseudonyms becomes possible, which results in the leakage of vehicle behavioral information.

In [12], Feng et al. proposed a privacy-preserving authentication scheme for V2X communication. In the system, a certification authority issues certificates for pseudonymous identities and enables anonymous authentication, while leveraging polynomial commitments to achieve constant-cost revocation checking. However, the system also focuses solely on authentication and revocation, and does not provide a reputation-based trust management. Moreover, the certificate update process is centrally managed, allowing the authority to link successive certificates, and thus the privacy of vehicles is compromised.

In [13], Hou et al. introduce a double-layer blockchain architecture, consisting of an event chain and a reputation chain, and propose a sophisticated reputation-based trust management system for V2X communication, which resists against on–off attacks and collusive attacks. However, the system does not address privacy protection. It assumes a fully trusted TA that issues public-key certificates, and thus the TA can easily deanonymize any vehicle even when pseudonyms are used. Moreover, since both reputation information and event reports are persistently stored on the blockchain, linkability among observations and historical behavior may still weaken privacy, even under pseudonym-based identifiers.

In [14], Fernandes et al. propose a V2X trust management system based on a consortium blockchain that employs a PoA (Proof of Authority) consensus mechanism, where RSUs collaboratively update reputation scores to improve efficiency. However, the system relies entirely on a centralized CA for certificate issuance and management, and it does not support certificate updates. As a result, it cannot also prevent deanonymization by the CA, and the reputation values tied to static IDs allow vehicle behavior to be tracked through linkable evaluation records.

2  Preliminaries

2.1 Bilinear Groups

We adopt the following bilinear groups:

1.    G1, G2 and GT are multiplicative groups with same prime order p, where gG1 and hG2 are generators.

2.    e:G1×G2GT is a bilinear map s.t.

•   for all uG1 and vG2, and a,bZ,e(ua,vb)=e(u,v)ab holds.

•   e(g,h) is a generator of GT.

2.2 Assumptions

For the security of the proposed system, we use the q-SDH assumption [15].

Definition 1 (q-SDH assumption): For all PPT algorithm 𝒜, the probability

Pr[𝒜(u,v,va,,v(aq))=(b,v1/(a+b))bZp]

is negligible, where uRG1, vRG2 and aRZp.

2.3 BB Signatures

We employ the scheme in [15] where a message and the signature can be proven by the zero-knowledge proofs.

Here are the descriptions of the algorithm.

•   BB-Setup: Select bilinear group parameters (p,G1,G2, GT, e,g,h).

•   BB-KeyGen: Compute w=hγ for γRZp, where the public key is pk=w and the secret key is sk=γ.

•   BB-Sign: On input of a message mZp, compute A=g1/(m+γ).

•   BB-Verify: On inputs of a message m and a signature A, check if e(A,whm)=e(g,h).

In [15], the security is proved under the q-SDH assumption.

2.4 BBS+ Signatures

We also use an extension of BB signature, BBS+ signature, which is informally introduced in [16], to sign a vector of numerous messages. The concrete structure is displayed in [17,18].

•   BBS+-Setup: Select bilinear group parameters (p,G1,G2,GT,e,g,h). Then, select g1,,gL+1RG1.

•   BBS+-KeyGen: Compute w=hγ for γRZp, where the public key is pk=w and the secret key is sk=γ.

•   BBS+-Sign: On input of a vector of L messages (m1,,mL)ZpL, choose η,ζRZp, and compute A=(gg1ζg2m1gL+1mL)1/(η+γ). The signature is σ=(A,η,ζ).

•   BBS+-Verify: For the signature σ=(A,η,ζ)and(m1,,mL),checkife(A,whη)=e(gg1ζg2m1 gL+1mL,h).

The security is proved in [18] under the q-SDH assumption.

2.5 Signature-Based Proofs of Knowledges (SPKs)

For Non-Interactive Zero-Knowledge Protocol (NIZK) proofs on representations, we adopt signature-based proofs of knowledge (SPKs), which are converted from zero-knowledge proofs of knowledge (PoKs) or Sigma protocols [19]. Concretely, we utilize the SPK to prove a representation of CG1 to g1,g2,G1 (or G2, or GT) which is denoted as SPK{(x1,x2,):C=g1x1g2x2}(M) where x1,x2,Zp. This SPK means a signature on message M by a signer with the secrets x1,x2, s.t. the relation holds.

2.6 Complete Subtree (CS) Method

We adopt Complete Subtree (CS) method [8] to achieve efficient user revocation in group signatures [2022]. First, a group manager (GM) generates a binary tree with the number of leaves equal to the total number of users, N. Each node is assigned a node ID, and each user is assigned to a leaf node. An example is shown in Fig. 1, where each user is assigned to nodes u7 to u14. The GM issues and publishes a membership certificate A for each node on the path from the root node to the leaf nodes u0,u1,,ul. Additionally, whenever a user is revoked, the GM issues and publishes a revocation certificate R for each cover node that is a root of a subtree whose subtrees consist only of leaf nodes of non-revoked users. A non-revoked user can prove that she has not been revoked by demonstrating the existence of both A and R generated from the same node. In the case shown in Fig. 1, if the user of node 10 is revoked, the GM selects cover nodes (u2, u3, u9) using the CS method and generates corresponding certificates (R2,R3,R9). The revocation list thus becomes (R2,R3,R9). For N total users and r revoked users, the size of the revocation list is O(rlog(N/r)), enabling efficient revocation with O(1) time complexity for signature generation and verification in group signatures.

images

Figure 1: Example of CS method

3  Model of Proposed System

3.1 Syntax

The proposed anonymous reputation system consists of the following algorithm and protocols. The participants of this system are the certificate authority (CA), the roadside units (RSUs), and vehicles. In this system, messages sent from each anonymous vehicle are linkable via a pseudonym (i.e., short-time public key) during each time interval, and messages across intervals are unlinkable. At the first message in the interval, the vehicle shows the vehicle’s reputation level to the nearest RSU, and the pseudonym at the interval is registered. The vehicle must ensure that the nearest RSU is not being revoked during this authentication. Each message is rated by the nearest RSU, and the scores at each interval are accumulated by RSUs. At the final message in the interval, the reputation of the vehicle is updated by the nearest RSU.

The anonymity of this system ensures that an adversary cannot obtain information about each vehicle other than the evaluation level and linkability (determining whether any two authenticated vehicles are the same) at each interval. This requirement means that the adversary cannot know the ID of the RSU with which each vehicle last communicated in the previous interval. Therefore, while hiding the public key of the last RSU that it communicated with, the vehicle performs a zero-knowledge proof of the certificate of the evaluation value by the RSU.

•   Setup: CA takes a security parameter λ as input. This algorithm generates a key pair of public key spk and secret key ssk of the CA and initializes set SSet that keeps tags of used reputation certificates. This algorithm also prepares RSUs in a CS tree structure, generates a secret key rski of each RSU i in the tree structure, and distributes the secret key to RSU i. SSet is shared with all RSUs.

•   Register: This is an interactive protocol between a vehicle and the CA. The common input is spk, and the input of the CA is ssk. The vehicle is issued a reputation certificate cert0 for initial reputation rep0=0.

•   RevokeRSU: This algorithm allows the CA to revoke an RSU. Given the ID of a revoked RSU, it outputs a revocation list RLT at the current revocation interval T.

•   Show: This protocol is called in the first communication at each time interval. This is an interactive protocol between a vehicle and the nearest RSU, where the vehicle shows that its reputation value is included in an integer range that is called reputation level. The vehicle also checks that the RSU is not being revoked. The common input are spk and reputation level . The vehicle’s input is certt1 for its current reputation value rept1. The RSU’s input is SSet. The common outputs are a pseudonym pseuτ of the vehicle at the current interval τ and the certificate pcertτ, the output of the vehicle is the secret key pskτ of pseuτ, and the outputs of the RSU are a commitment Cm,t to messages to be certified for next Update, and the updated SSet to which the tag St1 of certt1 is added. The pseudonym pseuτ, the reputation level , and Cm,t are shared with all RSUs.

•   Authentication: This is an interactive protocol between a vehicle and the nearest RSU. The common input is spk, and the inputs of the vehicle are message M, reputation level , pseuτ, pcertτ, and pskτ. The outputs of the RSU is the validity bit 1 (accepted) or 0 (rejected), and (M,pseuτ).

Each message M is rated by the nearest RSU based on some evaluation method (e.g., ARTSense [4]) that uses the reputation level together with other information. A negative rating is possible by using a negative integer. For the rated score s, (M,pseuτ,s) is shared with all RSUs.

•   Update: This protocol is called in the final communication at each time interval, where the total score s~τ for each pseuτ at the current interval τ, i.e., s~τ=isi for all (Mi,pseuτ,si), is prepared. This is an interactive protocol between a vehicle and the nearest RSU. The common input is spk, and the input of the vehicle is certt1 for the previous reputation rept1, and the inputs of the RSU i are pseuτ,Cm,t,s~τ,rski. The output of the vehicle is a new reputation certificate certt for the updated reputation rept=rept1+s~τ.

3.2 Security Requirements

As in [7], we consider the following requirements:

•   Reputation Unforgeability: Any vehicle cannot prove inappropriate reputation level, i.e., for the correct reputation rep~t1 which added from s~τ1,,s~τk, where s~τi is the total score for each pseuτi assigned to the vehicle at the interval τi, the vehicle cannot prove any inappropriate level s.t. rep~t1 is not included in the integer range of the level .

•   Anonymity: Any adversary cannot obtain any information on each vehicle except the reputation level and the linkability (i.e., whether the vehicles of any two authentications are the same or not ) in each interval from the protocols. This means that the adversary cannot determine whether the vehicles of any two authentications are the same or not across intervals. Furthermore, this requirement means that the adversary cannot know the ID of the nearest RSU that executes the Update protocol.

We adjust the security requirements in the underlying system [7] to our above-mentioned model in the V2X communication, as follows. In the underlying system, each authentication is rated, and the score is added to the reputation of the user, but in the proposed system, scores in each interval are summed and added to the the reputation of the vehicle. Thus, in the underlying system, all authentications are unlinkable w.r.t. the sameness of the user, but in the proposed system, the authentications during each interval are linkable (the authentications across intervals are unlinkable).

Furthermore, we require the following security properties in authentications and RSU revocation.

•   Misauthentication resistance: In each Authentication protocol, any vehicle which does not succeed Show protocol in the current interval cannot be accepted.

•   RSU revocablity: An RSU can be revoked, and then any vehicle with a reputation certificate issued from a revoked RSU does not succeed Show protocol.

We formally define the security requirements, as follows.

3.2.1 Reputation Unforgeability

In the definition of reputation unforgeability, we utilize the following oracles.

•   OCVReg: It takes as input vehicle ID k. A Register protocol is executed between the honest CA and a corrupted vehicle k controlled by the adversary 𝒜. k is added to the set of corrupted vehicles CV.

•   OCVShow: It takes as inputs vehicle ID kCV, RSU ID i, and reputation level . A Show protocol is executed between an honest RSU i and a corrupted vehicle k controlled by the adversary 𝒜, where the reputation level is proved, the pseudonym pseuτ and the certificate pcertτ for the current interval τ are outputted, SSet is updated, and an entry (k,pseuτ,,Cm,t,s~=0) is kept.

•   OCVAuth: It takes as inputs vehicle ID kCV, RSU ID i, the pseudonym pseuτ at the current interval τ, message M, and the rated score s. An Authentication protocol is executed between an honest RSU i and a corrupted vehicle k controlled by the adversary 𝒜 with the current revocation list RLT, where s~ in the entry (k,pseuτ,,Cm,t,s~) is updated as s~=s~+s.

•   OCVUpdate: It takes as inputs vehicle ID kCV, RSU ID i, and total score s~ at the current interval. An Update protocol is executed between an honest RSU i and a corrupted vehicle k controlled by the adversary 𝒜, where the total score s~ is added to the reputation rept1 of the vehicle k, and repk of the entry (k,repk) is updated as repk=repk+s~ (if no entry for k, new entry of (k,repk=s~) is generated).

•   ORevokeRSU: It takes as an input RSU ID i. Using RevokeRSU, the new RLT at the current interval T is outputted.

Then, consider the following reputation unforgeability game, where O=(OCVReg,OCVShow,OCVAuth,OCVUpdate,ORevokeRSU).

Game𝒜RU(λ):

   (spk,ssk,SSet,{rski})Setup(λ);

   Run 𝒜O(spk);

   Return 1 if

      the final OCVShow oracle is accepted,

      but repk is not in the integer range of level .

   Return 0;

Definition 2(Reputation Unforgeability): An anonymous reputation system is reputation unforgeable, if for any PPT adversary 𝒜,Pr[Game𝒜RU(λ)=1] is negligible in λ.

3.2.2 Misauthentication Resistance

In the definition of misauthentication resistance, we utilize the oracles in the reputation unforgeability.

Then, consider the following misauthentication resistance game, where O=(OCVReg,OCVShow,OCVAuth,OCVUpdate,ORevokeRSU).

Game𝒜MR(λ):

   (spk,ssk,SSet,{rski})Setup(λ);

   Run 𝒜O(spk);

   Return 1 if

      the final OCVAuth oracle is accepted,

      but the vehicle k is not accepted in OCVShow oracle previously executed during the same

      interval.

   Return 0;

Definition 3(Misauthentication Resistance): An anonymous reputation system is misauthentication resistant, if for any PPT adversary 𝒜, Pr[Game𝒜MR(λ)=1] is negligible in λ.

3.2.3 RSU Revocability

In the definition of RSU revocability, we utilize the oracles in the reputation unforgeability.

Then, consider the following revocability game, where O=(OCVReg,OCVShow,OCVAuth,OCVUpdate, ORevokeRSU).

Game𝒜Rev(λ):

   (spk,ssk,SSet,{rski})Setup(λ);

   Run 𝒜O(spk);

   Return 1 if

      the final OCVShow oracle is accepted,

      but for the vehicle k, the RSU i in the previously executed OCVUpdate oracle is revoked.

   Return 0;

Definition 4(RSU Revocability): An anonymous reputation system is RSU revocable, if for any PPT adversary 𝒜, Pr[Game𝒜Rev(λ)=1] is negligible in λ.

3.2.4 Anonymity

In the definition of anonymity, we utilize the following oracles.

•   OHVReg: It takes as input vehicle ID k. A Register protocol is executed between the corrupted CA controlled by the adversary 𝒜 and an honest vehicle k. k is added to the set of honest vehicles HV.

•   OHVShow: It takes as inputs vehicle ID kHV, RSU ID i, and reputation level . A Show protocol is executed between an honest vehicle k and a corrupted RSU i controlled by the adversary 𝒜, where the reputation level is proved, the pseudonym pseuτ and the certificate pcertτ for the current interval τ are outputted, SSet is updated, and an entry (k,pseuτ,,Cm,t,s~=0) is kept.

•   OHVAuth: It takes as inputs vehicle ID kHV, RSU ID i, the pseudonym pseuτ at the current interval τ, message M, and the rated score s. An Authentication protocol is executed between an honest vehicle k and a corrupted RSU i controlled by the adversary 𝒜 with the current revocation list RLT, where s~ in the entry (k,pseuτ,,Cm,t,s~) is updated as s~=s~+s.

•   OHVUpdate: It takes as inputs vehicle ID kHV, RSU ID i, and total score s~ at the current interval. An Update protocol is executed between an honest vehicle k and a corrupted RSU i controlled by the adversary 𝒜, where the total score s~ is added to the reputation rept1 of the vehicle k, and repk of the entry (k,repk) is updated as repk=repk+s~ (if no entry for k, new entry of (k,repk=s~) is generated).

•   ORevokeRSU: It takes as an input RSU ID i. Using RevokeRSU, the new RLT at the current interval T is outputted.

•   OLoR: It takes as inputs vehicle IDs k0,k1HV, RSU ID i, and reputation level . Return 0 if repk0repk1 for entries (k0,repk0),(k1,repk1). Otherwise, select random bit b, and a Show protocol is executed between an honest vehicle kb and a corrupted RSU i controlled by the adversary 𝒜, where the reputation level is proved, the pseudonym pseuτ and the certificate pcertτ for the current interval τ are outputted, SSet is updated, and an entry (kb,pseuτ,,Cm,t,s~=0) is kept. After that, a Show protocol is executed between an honest vehicle k¬b and a corrupted RSU i similarly. Then, Authentication protocols for kb and for k¬b with corrupted RSUs are executed, and Update protocols for kb and for k¬b with corrupted RSUs are executed, where the added score s~ is the same.

Then, consider the following anonymity game, where O=(OHVReg,OHVShow,OHVAuth,OHVUpdate, ORevokeRSU,OLoR).

Game𝒜Ano(λ):

  (spk,ssk,SSet,{rski})Setup(λ);

  b𝒜O(spk,ssk,{rski});

  Return 1 if b=b;

  Return 0;

Definition 5(Anonymity): An anonymous reputation system is anonymous, if for any PPT adversary 𝒜, |Pr[Game𝒜Ano(λ)=1]1/2| is negligible in λ.

4  Proposed Scheme

4.1 Construction Idea

In BARS [6], two central authorities update a certificate for a short-time public key and the reputation to issue the vehicle, where the authorities have to evaluate each vehicle and update the reputation and the certificate. As a result, the update process is centralized and not scalable.

In our system, distributed RSUs in the V2X system manage the scores of each vehicle in each interval, and the nearest RSU updates a certificate for the new reputation using the RSU’s secret key.

As the base system, we adopt the anonymous reputation system [7] for crowdsensing. In the system, a server and users participate. The server issues a certificate for the reputation to each user, where the certificate is a BBS+ signature on the user’s secret, a certificate tag for checking one-time use of the certificate, and the reputation. Since the concrete value of the reputation can reveal the relevance to other authentications, the reputation level (an integer range where the reputation value is included) is shown in the Show protocol for authentication. In addition, while the reputation value is hidden using commitments, the certificate is updated by the server s.t. the certified reputation is reflected by the score for the authentication using the evaluation method of ARTSense [4].

We extend the system of [7] to construct the anonymous reputation system for V2X communication, as follows. In our system, a CA, RSUs, and vehicles participate. The central CA generates the CA’s key pair, and each RSU’s individual key pairs, and also generates the certificate of the RSU’s public key as a BBS+ signature which can be proved by an SPKs. The BBS+ signature is also used for RSU revocation, as mentioned later. At first, a vehicle is issued as an initial certificate which is similar to the original certificate in [7], i.e., a BBS+ signature on the user’s secret, a certificate tag, and the (initial) reputation. The original Show protocol is separated to Show protocol and Update protocol in our system. In Show called in the first time of each time interval, a vehicle proves the knowledge of the reputation certificate similarly to [7] to show the reputation level. In Update called in the final time of each time interval, instead of the central CA, the nearest RSU updates the reputation certificate reflected by the total score of the vehicle in the interval, where the BBS+ signature of the certificate is generated using the RSU’s secret key.

The point in this construction is that, in Show, the vehicle needs to hide the ID of the RSU updating the certificate, since the RSU’s ID allows one to link Show and Update by the same RSU. This is why we use an SPK where the RSU’s public key of BBS+ signatures is hidden but the correctness is ensured by proving the knowledge of the certificate of the public key.

In addition, we introduce the authentication protocol for each vehicle accepted by Show protocol to send a message to the nearest RSU. In Show protocol, for a short time public key in an ordinary digital signature scheme, the public key certificate is issued from the RSU. In each message authentication, the sent message is signed w.r.t. the public key. Thus, authentications during one interval can be linked. However, authentications across the interval are unlinkable.

Furthermore, we adopt a CS-based revocation method for RSUs. A CS tree is constructed, where each leaf corresponds to an RSU. The certificate of an RSU’s key consists of BBS+ signatures on the RSU’s secret key and on each node ID uj along the path from the root to the RSU’s leaf. To revoke an RSU, the CA selects cover nodes representing the revocation and publishes BBS+ signatures on these cover nodes together with the revocation interval, forming the revocation certificate. In the Show protocol, the vehicle additionally proves that for some node ID uj—which is signed by a BBS+ signature for the public key of the RSU that issued the current reputation certificate—the uj is a cover node, i.e., it is signed as part of the revocation certificate. This implies that the RSU has not been revoked.

4.2 Proposed Algorithm and Protocols

Fig. 2 illustrates the overall protocol flow among the vehicle, the nearest RSU, and the CA. The system public parameters are published to all participants. In Setup, the CA distributes secret keys to RSUs. In Register, the CA provides each vehicle with a vehicle secret key and an initial reputation certificate. The latest RSU revocation list is distributed in RevokeRSU. At the beginning of each interval, the vehicle executes the Show protocol with the nearest RSU to prove its reputation level and register a fresh short-term public key as its pseudonym key. During the interval, messages are authenticated using pseudonym-based signatures, and the RSU locally updates the scores. At the end of the interval, the vehicle anonymously obtains an updated reputation certificate from the nearest RSU through the Update protocol.

images

Figure 2: Protocol flow: Setup, Register, RevokeRSU, Show, per-message Authentication in an interval, and Update

The proposed algorithm and protocols are as follows.

Setup: In this algorithm, the CA generates key pairs of BB signatures and BBS+ signatures. Then, the CA computes the BB signature on every value in the integer range of reputation level 1L as the reputation level certificate. The CA also computes the secret key rski of each RSU i and their BBS+ signatures. The RSU is authenticated using CS-method-based revocable scheme. In the previous work [7], a BB signature certificate for the public key w2,i=h0γ2,i of RSU i was issued as A~i=f01/(γ1+γ2,i). However, in the proposed system, the certificate is changed to a BBS+ signature certificate A~i,j. This allows it to serve not only as the certificate of RSU public key but also as the certificate A of node uj in the CS method.

1.    Select bilinear groups G1,G2,GT, and a bilinear map e with a prime order p>2λ, where λ is the given security parameter. Then, select g0,g1,g2,g3,g4,f0,f1RG1, h0,h1RG2. For all 1L, choose γ0,RZp, and computes w0,=h0γ0,, where γ0, is the secret key for the BB signature proving the reputation level . Choose γ1RZp, and compute w1=h0γ1, where γ1 is the secret key for the following certificate (BBS+ signature) for w2,i. For all RSU i[1,numRSU], where numRSU is the number of RSUs, choose γ2,iRZp, and compute w2,i=h0γ2,i and w~2,i=g3γ2,i where γ2,i is the secret key of every RSU i in the BBS+ signatures. As the special secret key of the CA, choose γ2,0RZp, and compute w2,0=h0γ2,0 and w~2,0=g3γ2,0.

2.    For all 1L, generate the reputation level certificate A,R,k=f01/(γ0,+R,k) (BB signature) for every value R,k in the -th integer range indicating reputation level , where K is the number of the values in the -th integer range.

3.    The CA assigns RSU i to a leaf ul of a binary tree in CS method, and u0,ul,,u are the nodes on the path from the root node to the leaf node u. For j=0,,, randomly choose ηi,j,ζi,jRZp and issue a BBS+ signature (A~i,j,ηi,j,ζi,j) on (uj,γ2,i) s.t.

A~i,j=(g0g1ζi,jg2ujg3γ2,i)1γ1+ηi,j.

Then, send vi:=(u0,u1,,u) to RSU i. The public key of RSU i is w~2,i=g3γ2,i.

4.    For pseudonym certificates of each RSU i[0,numRSU], generate a secret key pcski and the corresponding public key pcpki in the ordinary digital signature scheme. For the public key certificates, generate a secret key pcskCA of CA and the corresponding public key pcpkCA in the ordinary digital signature scheme. For every i[1,numRSU], generate the public key certificate pcpkcerti as the digital signature on message (pcpki,i) using the secret key pcskCA.

5.    Initialize set SSet as empty, and output CA’s public key

spk=(p,G1,G2,GT,e,{w0,}=1L,w1,{(w2,i,w~2,i}i=0numRSU,g0,g1,g2,g3,g4,f0,f1,h0,h1,{{A,k}k=1K}=1L,{vi,{(A~i,j,ηi,j,ζi,j)}j=0}i=0numRSU,pcpkCA),

the CA’s secret key ssk=γ2,0, and the RSU’s secret key rski=(γ2,i,pcski,pcpki,pcpkcerti) for i[1,numRSU].

Register: This is an interactive protocol between a vehicle V and the CA. The CA issues an initial reputation certificate cert0 for the vehicle. The common input is spk, and the CA’s input is ssk.

1.   [V]: Select secret xRZp, a reputation certificate’s tag S0RZp, and a random factor ζ0RZp. Compute the commitment to the messages (x,S0) to be signed by Cm,0=g1ζ0g2xg3S0. Then, prove to the CA that Cm,0 is correctly formed by the following SPK on a random message M^.

SPK{(ζ0,x,S0):Cm,0=g1ζ0g2xg3S0}(M^)

2.   [CA]: Set the initial reputation as rep0=0, and choose random factors ζ0,η0RZp. Then, using the secret key γ2,0 of BBS+ signatures, sign the vector of messages (x,S0,rep0) as B0=(g0g1ζ0Cm,0g4rep0)1/γ2,0+η0, and send back σ~0=(B0,η0,ζ0) to the vehicle.

3.   [V]: Set Cm,0=Cm,0g4rep0 for rep0=0, compute ζ0=ζ0+ζ0, and set the BBS+ signature on the messages (x,S0,rep0) as σ~0=(B0,η0,ζ0), where B0=(g0g1ζ0g2xg3S0g4rep0)1/γ2,0+η0. Output cert0=(x,rep0,σ~0,S0,Cm,0).

RevokeRSU: This algorithm enables the CA to revoke an RSU. For the current tree, the cover nodes obtained using the CS method are denoted as {u0,u1,,unum}, where numrlog(N/r). For all i[0,num], random values ηT,j,ζT,jRZp are chosen, and the revocation certificate is calculated as a BBS+ signature (RT,j,ηT,j,ζT,j) on (uj,T) s.t.

RT,j=(g0g1ζT,jg2ujg3T)1γ1+ηT,j.

The revocation list is output as RLT={(RT,j,ηT,j,ζT,j)}j=1num.

Show: This is an interactive protocol between a vehicle V and the nearest RSU, where the vehicle shows RSU its reputation level , a pseudonym pseuτ is registered for a time interval τ, and the corresponding secret key pskτ is kept in V. At the beginning of the protocol, the vehicle’s reputation value is proved on certt1, where the vehicle’s inputs are certt1=(x,rept1,σ~t1,St1,Cm,t1), where σ~t1=(Bt1,ηt1,ζt1). Here, t indicates the number of updates in the reputation certificates for the vehicle. Let RSU i be the RSU that issued σ~t1. The input of RSU is SSet.

1.   [V]: From spk, retrieve a reputation level certificate A,rept1 such that its current reputation rept1 is in the -th range. Choose rARZp and compute the commitment CA=A,rept1f1rA and ρ=rArept1. Retrieve a certificate (A~i,j,ηi,j,ζi,j) for a node uj of the CS-method tree s.t. the certificate was issued to the RSU i and uj is a cover node at the current revocation time T. Choose ζ^RZp and compute the commitment CA~i,j=A~i,jg1ζ^. Choose rw~2,iRZp and compute the commitment Cw~2,i=w~2,if1rw~2,i. Set θ=ζi,j+ζ^ηi,j. Retrieve the revocation certificate (RT,j,ηT,j,ζT,j) for the cover node uj at T. Choose ζ^RZp, and compute CRT,j=RT,jg1ζ^. Set θ=ζT,j+ζ^ηT,j Then, choose ζ^,rw2,iRZp, compute the commitments CBt1=Bt1g1ζ^ and Cw2,i=w2,ih1rw2,i, and set θ=ζt1+ζ^ηt1. Choose ζtRZp and StRZp, and compute Cm,t=g1ζtg2xg3Stg4rept1 as the commitment to the vector of (x,St,rept1). Set ν=ζ^rw2,i and compute the commitments Cζ^=g0ζ^g1rζ^ and Cν=g0νg1rν for a randomly chosen rζ^,rνZp. Set β^=rνrw2,irζ^. Send CA,CA~i,j,Cw~2,i,CRT,j,CBt1,Cw2,i,Cm,t,Cζ^,Cν, and St1 to the nearest RSU, and using the following SPK on a random message M^, prove that the reputation rept1 is in the -th range, certt1 is valid, Cm,t is correct, and the RSU i is not revoked.

SPK{(rA,rept1,ρ,θ,uj,rw~2,i,ηi,j,ζ^,θ,ηT,j,ζ^,θ,x,rw2,ηt1,ζ^,ν,rζ^,rν,β^,ζt,St):e(CA,w0,)e(f0,h0)1=e(f1,w0,)rAe(CA,h0)rept1e(f1,h0)ρ(1)

e(CA~i,j,w1)e(Cw~2,i,h0)1e(g0,h0)1=e(g1,h0)θe(g2,h0)uje(f1,h0)rw~2,ie(CA~i,j,h0)ηi,je(g1,w1)ζ^(2)

e(CRT,j,w1)e(g3,h0)Te(g0,h0)1=e(g1,h0)θe(g2,h0)uje(CRT,j,h0)ηT,je(g1,w1)ζ^(3)

e(CBt1,Cw2,i)e(g3,h0)St1e(g0,h0)1=e(g1,h0)θe(g2,h0)xe(g4,h0)rept1e(CBt1,h1)rw2,i    e(CBt1,h0)ηt1e(g1,Cw2,i)ζ^e(g1,h1)ν(4)

Cζ^=g0ζ^g1rζ^Cν=g0νg1rν(5)

Cν=Cζ^rw2,ig1β^(6)

e(Cw~2,i,h0)e(g3,Cw2,i)1=e(f1,h0)rw~2,ie(g3,h1)rw2,i(7)

Cm,t=g1ζtg2xg3Stg4rept1}(M^).(8)

The Eq. (1) implies the verification of the (variant of) BB signature A~ on message rept1 for level , as in [7]. The Eq. (2) implies the verification of the BBS+ signature (A~i,j,ηi,j,ζi,j) on messages uj,γ2,i w.r.t. the CA’s public key w1, which ensures the node uj on the path to RSU and the RSU’s public key w2,i. The Eq. (3) implies the verification of BBS+ signature (RT,j,ηT,j,ζT,j) on message uj,T w.r.t. public key w1, which ensures that the cover node uj of the tree at time T is the same as the node uj for A~i,j. The Eqs. (5) and (6) show ν=ζ^rw2,i, and thus the Eq. (4) implies the verification of the BBS+ signature (Bt1,ηt1,ζt1) on messages x,St1,rept1 w.r.t. the RSU i’s public key w2,i. The Eq. (7) shows the same secret key γ2,i of w2,i and w~2,i. These are proved in Lemma 1 in the next section.

2.   [RSU]: To check the freshness of the proved certificate, check if St1SSet. If it is true, abort. Otherwise, add tag St1 in set SSet. Verify the SPK. If it is invalid, abort.

3.   [V]: Generate a short-time key pair in the ordinary digital signature scheme, where the public key is opkτ and the secret key is oskτ. Send opkτ as the pseudonym at the current interval τ.

4.   [RSU]: As the certificate on opkτ, generate the ordinary signature sigi,τ on message (opkτ,,τ,i) using the secret key pcski in rski, for the reputation level of the vehicle, and send pseuτ=opkτ and pcertτ=(sigi,τ,pcpki,pcpkcerti). Output pseuτ, pcertτ, Cm,t, and the updated SSet.

5.   [V]: Verify the signature sigi,τ on (opkτ,,τ,i) using the public key pcpki in the ordinary digital signatures. Verify the signature pcpkcerti on (pcpki,i) using the public key pcpkCA in the ordinary digital signatures. If either is invalid, abort. Otherwise, output pseuτ=opkτ, pcertτ=(sigi,τ,pcpki,pcpkcerti), and pskτ=oskτ.

Authentication: This is an interactive protocol between a vehicle V and the nearest RSU. The common input is spk, and the input of the vehicle is message M, pseuτ, pcertτ, and pskτ. The output of the RSU is the validity bit 1 (accepted) or 0 (rejected), and (M,pseuτ).

1.   [V]: For message M, using the secret key pskτ=oskτ, compute the digital signature authsig on M and send (M,authsig,pseuτ,pcertτ,).

2.   [RSU]: Using pcpki (resp., pcpkCA), verify the signature sigi,τ (resp., pcpkcerti) on (opkτ,,τ,i) (resp., (pcpki,i)) where pcertτ=(sigi,τ,pcpki,pcpkcerti) and pseuτ=opkτ. Using opkτ, verify the signature authsig on M. If either one is not valid, abort. Otherwise, this vehicle is accepted. Output (M,pseuτ).

Update: This is an interactive protocol between a vehicle and the nearest RSU i. The common input is spk, and the input of the vehicle is certt1 for the previous reputation rept1, and the inputs of the RSU i are pseuτ,Cm,t,s~τ,rski. The output of the vehicle is a new reputation certificate certt for the updated reputation rept=rept1+s~τ.

1.   [RSU]: Compute Cm,t=Cm,tg4s~τ, and using γ2,i in rski=(γ2,i,pcski,pcpki,pcpkcerti), generate Bt=(g0g1ζtCm,t)1/γ2,i+ηt=(g0g1ζtg1ζtg2xg3Stg4rept1g4s~τ)1/γ2,i+ηt for ζt,ηtRZp. Then, send back σ~t=(Bt,ηt,ζt) to the vehicle.

2.   [V]: Compute ζt=ζt+ζt, rept=rept1+s~τ and set the signature on the vector of messages (x,St,rept) as σ~t=(Bt,ηt,ζt), where Bt=(g0g1ζtg2xg3Stg4rept)1/γ2,i+ηt. Output certt=(x,rept,σ~t,St,Cm,t).

5  Security

For the security of our system, we show the following lemma.

Lemma 1: The SPK in Show proves the knowledge of A, ξ, rept1,A~i,j,ζi,j,ηi,j,uj,RT,j,ζT,j,ηT,j,Bt1,ζt1,ηt1,x such that

A=(f0f1ξ)1/(γ0,+rept1),A~i,j=(g0g1ζi,jg2ujg3γ2,i)1γ1+ηi,j,RT,j=(g0g1ζT,jg2ujg3T)1γ1+ηT,j,Bt1=(g0g1ζt1g2xg3St1g4rept1)1/(γ2,i+ηt1),w2,i=h0γ2,i, and w~2,i=g3γ2,i.

Proof: The equation for A can be shown as in [7], since the Eq. (1) proved in the SPK is the same. From Eq. (2), we obtain

e(CA~i,j,w1h0ηi,j)e(g1ζ^,w1)e(g1,h0)ζ^ηi,j=e(Cw~2,i,h0)e(g2,h0)uje(f1rw~2,i,h0)e(g0,h0)e(g1θ,h0)e(g1,h0)ζ^ηi,je(CA~i,jg1ζ^,w1h0ηi,j)=e(Cw~2,if1rw~2,ig2ujg1θζ^ηi,jg0,h0)

Setting A~i,j=CA~i,jg1ζ^, w~2,i=Cw~2,if1rw~2,i and ζi,j=θζ^ηi,j, we have e(A~i,j,w1h0ηi,j)=e(w~2,ig2ujg1ζi,jg0,h0). For w1=h0γ1 and w~2,i=g3γ2,i, this implies A~i,j=(g0g1ζi,jg2ujg3γ2,i)1/(γ1+ηi,j). From the Eq. (3), we can show RT,j=(g0g1ζT,jg2ujg3T)1/(γ1+ηT,j) similarly. In addition, from the Eqs. (5), (6), we have ν=ζ^rw2,i, and we can transform the Eq. (4) to

e(CBt1g1ζ^,Cw2,ih1rw2,ih0ηt1)=e(g0g1θζ^ηt1g2xg3St1g4rept1,h0).

Setting Bt1=CBt1g1ζ^, w2,i=Cw2,ih1rw2,i and ζt1=θζ^ηt1, we have e(Bt1,w2,ih0ηt1)=e(g0g1ζt1g2xg3St1g4rept1,h0). For w2,i=h0γ2,i, this implies Bt1=(g0g1ζt1g2xg3St1g4rept1)1/(γ2,i+ηt1). Finally, from Eq. (7), we obtain e(Cw~2,if1rw~2,i,h0)=e(g3,Cw2,ih1rw~2,i), which means that the discrete log γ2,i of w~2,i=Cw~2,if1rw~2,i with base g3 is the same as the discrete log of w2,i=Cw2,ih1rw~2,i with base h0.

As mentioned in [7], A=(f0f1ξ)1/(γ0,+rept1) is modified from the original BB signature A=f01/(γ0,+rept1), but forging A can be reduced to forging the BB signature.

Here, we prove the security of the proposed system.

Theorem 1: The proposed scheme is reputation unforgeable, under the security of BB signatures, BBS+ signatures, commitments, and digital signatures in the random oracle model.

Proof: Assume an adversary 𝒜 that wins the reputation unforgeability game with non-negligible probability. In the game, we can extract the proved secrets from SPKs in each Show protocol via OCUShow. For the winning game, we consider the following four cases.

•   Case 1: In a Show protocol, an extracted BBS+ signature ((A~i,j,ηi,j,ζi,j),(RT,j,ηT,j,ζT,j), or (Bt1,ηt1,ζt1)) has not been issued by CA or RSUs.

•   Case 2: In a Show protocol, an extracted (variant of) BB signature A has not been issued by CA.

•   Case 3: In a Register or Show protocol, the extracted committed values compromise the binding property of commitments.

•   Case 4: In an Authentication protocol, a digital signature sigi,τ, or pcpkcerti is forged.

When all of Cases 1–4 do not happen, any corrupted vehicle cannot prove the incorrect level s.t. the concrete reputation value rept1 is not included in the range, as follows. The reputation value rept1 of each vehicle is ensured by a BBS+ signature σ~t1=(Bt1,ηt1,ζt1) on x,St1,rept1 using the RSU i’s (or CA’s) key pair (γ2,i,w2,i). The BBS+ signature (A~i,j,ηi,j,ζi,j) on (uj,γ2,i) using the CA’s key pair (γ1,w1) implies that the proven key pair (γ2,i,w2,i) is ensured by the CA, i.e., it is not a forged key pair, and a node uj is on the path to the RSU i. Due to the BBS+ signature (RT,j,ηT,j,ζT,j) on (uj,T), the node uj is a cover node at time T, i.e., the RSU i is not revoked. Furthermore, a variant of BB signature A on the rept1 using the key pair (γ0,,w0,) implies that the proved rept1 belongs to the integer range of reputation level . In each Authentication, due to digital signatures authsig, sigi,τ, and pcpkcerti, the score s is added to s~ for the corrupted vehicle via the pseudonym pseuτ. Since the SPK in Show proves Cm,t=g1ζtg2xg3Stg4rept1, for the correct rept=rept1+s~τ, the new BBS+ signature (Bt,ηt,ζt) on x,St,rept is issued in Update protocol. In Show protocol, St1 is checked for the freshness of the proved certificate, and thus each rept is correctly updated. Therefore, for the correct reputation rep~t1 which is added from s~τ1,,s~τk where s~τi is the total score for each pseuτi assigned to the vehicle at the interval τi, the vehicle cannot prove any inappropriate level s.t. rep~t1 is not inculded in the integer range of the level .

Therefore, one of Case 1–4 happens with some non-negligible probability. Case 1 (resp., 2–4) can be reduced to an adversary 𝒜BBS+ (resp., 𝒜BB, 𝒜com, and 𝒜DS) against BBS+ signatures (resp., BB signatures, commitments (binding property), and digital signatures). The reductions are similar to the proof of Lemma 2 shown in the journal version [23] of the underlying system [7]. Here, we show the outline and key points, as follows.

•   𝒜BBS+: Given a public key of BBS+ signatures, generate other parameters in Setup and run 𝒜 on spk, where in case of the reduction to (A~i,j,ηi,j,ζi,j), the BBS+ signature is obtained via the BBS+ signing oracle. For oracles where the target type of BBS+ signature ((RT,j,ηT,j,ζT,j), or (Bt1,ηt1,ζt1)) is issued, extract the secrets from the SPKs if needed, and access the BBS+ signing oracle to obtain the BBS+ signature. Then, in Case 1, a non-issued BBS+ signature is extracted in a Show protocol, which is outputted as 𝒜BBS+.

•   𝒜BB: This case is the same as the proof in the underlying system [23], since the construction is the same. Given a public key of BB signatures, randomly guess level ~, and obtain BB signatures A~,R~,k via the BB signing oracle. Generate other BB signatures A,R~,k with ~ and other parameters as in Setup, and run 𝒜 on spk, where each oracle is addressed as in the real protocols. Then, in Case 2, a variant of non-issued BB signature is extracted in a Show protocol. Similarly to the proof in the underlying system [23], it is transformed to a non-issued BB signature, which is outputted as 𝒜BB.

•   𝒜com: Given public parameters of commitments, generate other parameters in Setup and run 𝒜 on spk, where each oracle is addressed as in the real protocols except that the committed values are extracted from SPKs. Check the consistency between Update and Show in the same commitment. If inconsistency happens, the collision values are outputted as 𝒜com, which compromises the binding property of commitments.

•   𝒜DS: Given a public key of the digital signatures, use the public key as pcpki or pcpkCA according to the target type of signatures, generate other parameters in Setup, and run 𝒜 on spk, where in case of the reduction to pcpkcerti, the digital signatures is obtained via the signing oracle. Each oracle is addressed as in the real protocols except the following. When the target type of digital signature is sigi,τ, for oracles where sigi,τ is issued, access the signing oracle to obtain the signature. Then, in Case 4, a non-issued digital signature is used in an Authentication protocol, which is outputted as 𝒜DS.

Theorem 2: The proposed scheme is misauthentication resistant, under the security of digital signatures.

Proof: Assume an adversary 𝒜 that wins the misauthentication resistance game with non-negligible probability. In this game, 𝒜 is not issued psertτ for pseudonym pseuτ, but 𝒜 is accepted in OCVAuth in the interval τ. Thus, since 𝒜 successfully forges the digital signature sigi,τ or pcpkcerti in OCVAuth, we can construct an adversary 𝒜DS against the digital signatures, as in the proof of Theorem 1.

Theorem 3: The proposed scheme is RSU revocable, under the security of BBS+ signatures in the random oracle model.

Proof: Assume an adversary 𝒜 that wins the RSU revocability game with non-negligible probability. In the game, we can extract the proved secrets from SPKs in each Show protocol via OCUShow. In the RSU revocability game, for the extracted BBS+ signature (A~i,j,ηi,j,ζi,j) on node uj, the issuing RSU i is revoked. Thus, for the extracted BBS+ signature (RT,j,ηT,j,ζT,j) on node uj, the revocation based on CS method means ujuj, if these extracted BBS+ signatures were issued by the honest CA. However, since the verification for the SPKs is accpeted, we have uj=uj, due to the soundness of the SPK for the same secret. This means that either of the extracted BBS+ signatures is forged by 𝒜. Thus, we can construct an adversary 𝒜BBS+ against the BBS+ signatures, as in the proof of Theorem 1.

Theorem 4: The proposed scheme is anonymous in the random oracle model.

Proof: In the random oracle model, SPKs can be simulated. Let Game 0 be the original anonymity game. Consider Game 1 where the followings are modified from Game 0: In the Show protocols for OLoR request, as honest vehicles kb and k¬b, execute the zero-knowledge simulations instead of the SPKs, and replace the commitments CA,CA~i,j,Cw~2,i,CRT,j,CBt1,Cw2,i,Cm,t,Cζ^, and Cν with random elements of the corresponding group.

Then, consider the responses to OLoR request in Game 1. In the Show protocols, the zero-knowledge simulation, the replaced random elements, and one-time used random St1 are sent to 𝒜, but these values have no information on b. Furthermore, sigi,τ is one-time digital signature for one-time public key opkτ only during the interval τ. Therefore, the probability that 𝒜 correctly guesses b is 1/2.

On the other hand, due to the zero-knowledge-ness of the SPK and the perfect hiding of the commitments, both games are indistinguishable. Therefore, in Game 0, the probability that 𝒜 correctly guesses b is also 1/2.

6  Efficiency

In this section, we discuss the efficiency of our system, compared to BARS [6]. In BARS, two authorities (CA and LEA) cooperatively update the reputation of each vehicle and issue the updated certificate to the vehicle. Thus, the centralized issuing process involving two authorities is a bottleneck. In our system, the issuing process is distributed, which is executed between a vehicle and the nearest RSU, and thus the bottleneck is resolved.

On the other hand, although BARS adopts an ordinary digital signature scheme for the public key and the certificate, our system utilizes the pairing-based computations in Show protocol, whose costs are heavier than the ordinary public key cryptosystems such as RSA and ECC. In Table 2, we present the computational costs of a vehicle and an RSU in the Show protocol, measured as the number of pairings and exponentiations on G1, G2, and GT, excluding precomputable operations. In [22], implementation results of a pairing-based group signature scheme are presented, using the Barreto–Lynn–Scott (BLS) curve with embedding degree 12 over a 455-bit prime field to achieve 128-bit security. The results show that the computation time of an exponentiation on a G1 element is approximately 0.25 ms, while those of exponentiation on G2 and GT elements and a pairing are about 0.53, 0.74, and 1.45 ms, respectively, on a Core i7-7700K (4.20 GHz) CPU. Based on these measurements, the processing time required by a vehicle in Show protocol is approximately 30 ms, while that of an RSU is about 43 ms. Although the computational costs are heavier than BARS, the computations of commitments and SPK in the vehicle can be pre-computed before Show protocol, and the needed online computations are only multiplications in the responses in SPK.

images

As for the data size submitted by a vehicle in Show protocol, the data contains 8 G1-elements, 1 G2-elements, and 24 Zp-elements. In the implementation results reported in [22], a G1-element is represented using 58 bytes, whereas a G2-element and a Zp-element are represented using 115 and 39 bytes, respectively. Using the results, the submitted data size is approximately 1500 bytes.

We emphasize that Show protocol is required only at the beginning of each interval. The interval length can be configured to practical values (e.g., several hours or a day), and the interval boundaries of vehicles can be offset so that Show protocols do not concentrate on a single RSU. During the interval, per-message authentication is performed using the same pseudonym-certificate mechanism as in existing RSU-assisted V2X systems such as BARS, and therefore the communication pattern and verification cost at RSUs remain unchanged from prior work. The SPK-related load is limited to a single proof of approximately 1.5 KB, most of whose computation can be performed offline by the vehicle; The verification cost at the RSU is estimated to be about 40 ms, based on timing measurements of the underlying cryptographic operations. Because the SPK is executed only once per interval and the per-message operations are identical to existing systems, we consider that the proposed system does not impose additional constraints on RSU coverage or handoff latency in high-mobility V2X environments, and that its scalability with respect to the number of RSUs and vehicles is unlikely to become a major concern.

7  Conclusion

In this paper, a distributed anonymous reputation system for V2X communication is proposed. The proposed system distributes the task to update the vehicles’ reputation certificates to RSUs, in which the nearest RSU updates the certificate anonymously at the end of each interval. This approach resolves the bottleneck in the certificate update process and improves the scalability.

Our future works include the implementation of the proposed system, network-level performance evaluations under specific traffic and mobility models (e.g., NS-3 or SUMO), realizing the transparency based on blockchain, and a detailed reputation evaluation algorithm.

Acknowledgement: Not applicable.

Funding Statement: The authors received no specific funding for this study.

Author Contributions: The authors confirm contribution to the paper as follows: Conceptualization, Shahidatul Sadiah and Toru Nakanishi; methodology, Shahidatul Sadiah and Toru Nakanishi; validation, Shahidatul Sadiah and Toru Nakanishi; formal analysis, Shahidatul Sadiah and Toru Nakanishi; investigation, Shahidatul Sadiah and Toru Nakanishi; writing—original draft preparation, Shahidatul Sadiah; writing—review and editing, Shahidatul Sadiah and Toru Nakanishi; supervision, Toru Nakanishi. All authors reviewed the results and approved the final version of the manuscript.

Availability of Data and Materials: Not applicable.

Ethics Approval: Not applicable.

Conflicts of Interest: The authors declare no conflicts of interest to report regarding the present study.

References

1. Li Q, Malip A, Martin KM, Ng S, Zhang J. A reputation-based announcement scheme for VANETs. IEEE Trans Veh Technol. 2012;61(9):4095–108. [Google Scholar]

2. Yang N. A similarity based trust and reputation management framework for VANETs. Int J Future Gener Commun Netw. 2013;6(2):25–34. [Google Scholar]

3. Jesudoss A, Raja SK, Sulaiman A. Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme. Ad Hoc Netw. 2015;24:250–63. [Google Scholar]

4. Wang XO, Cheng W, Mohapatra P, Abdelzaher T. ARTSense: anonymous reputation and trust in participatory sensing. In: Proceedings of IEEE INFOCOM 2013; 2013 Apr 14–19; Turin, Italy. p. 2517–25. [Google Scholar]

5. Jaimes LMS, Ullah K, Moreira ES. ARS: anonymous reputation system for vehicular ad hoc networks. In: Proceedings of the 8th IEEE Latin-American Conference on Communications (LATINCOM); 2016 Nov 15–17; Medellin, Colombia. p. 1–6. [Google Scholar]

6. Lu Z, Liu W, Wang Q, Qu G, Liu Z. A privacy-preserving trust model based on blockchain for VANETs. IEEE Access. 2018;6:45655–64. [Google Scholar]

7. Sadiah S, Nakanishi T. An efficient anonymous reputation system for crowd sensing. In: Seventh International Symposium on Computing and Networking Workshops (CANDAR 2019 WorkshopsWICS 2019; 2019 Nov 26–29; Nagasaki, Japan. p. 374–80. [Google Scholar]

8. Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Advances in cryptology-CRYPTO 2001. LNCS 2139. Berlin/Heidelberg, Germany: Springer-Verlag; 2001. p. 41–62. [Google Scholar]

9. Sadiah S, Nakanishi T. A distributed anonymous reputation system for V2X communication. In: Proceedings of the IEEE International Conference on Consumer Electronics (ICCE); 2024 Jan 6–8; Las Vegas, NV, USA. p. 1–6. [Google Scholar]

10. Ahmed W, Wu D, Mukathe D. Blockchain-assisted privacy-preserving and context-aware trust management framework for secure communications in VANETs. Sensors. 2023;23(12):5766. [Google Scholar] [PubMed]

11. Feng X, Shi Q, Xie Q, Liu L. An efficient privacy-preserving authentication model based on blockchain for VANETs. J Syst Archit. 2021;117:102158. [Google Scholar]

12. Feng X, Cui K, Wang L, Liu Z, Ma J. PBAG: a privacy-preserving blockchain-based authentication protocol with global-updated commitment in IoVs. IEEE Trans Intell Transp Syst. 2024;25(10):13524–13545. [Google Scholar]

13. Hou B, Xin Y, Zhu H, Yang Y, Yang J. VANET secure reputation evaluation & management model based on double layer blockchain. Appl Sci. 2023;13(9):5733. [Google Scholar]

14. Fernandes CP, Montez C, Adriano DD, Boukerche A, Wangham MS. A blockchain-based reputation system for trusted VANET nodes Ad Hoc Networks. 2023;140:103071. [Google Scholar]

15. Boneh D, Boyen X. Short signatures without random oracles. In: Advances in cryptology-EUROCRYPT 2004. LNCS 3072. Berlin, Heidelberg: Springer-Verlag; 2004. p. 56–73. [Google Scholar]

16. Boneh D, Boyen X, Shacham H. Short group signatures. In: Advances in cryptology-CRYPTO 2004. LNCS 3152. Berlin/Heidelberg, Germany: Springer-Verlag; 2004. p. 41–55. [Google Scholar]

17. Au MH, Susilo W, Mu Y. Constant-size dynamic k-TAA. In: Security and cryptography for networks (SCN 2006). LNCS 4116. Berlin/Heidelberg, Germany: Springer-Verlag; 2006. p. 111–25. [Google Scholar]

18. Camenisch J, Drijvers M, Lehmann A. Anonymous attestation using the strong diffie-Hellman assumption revisited. In: Trust and trustworthy computing (TRUST 2016). Cham, Switzerland: Springer; 2016. p. 1–20. [Google Scholar]

19. Damgård I. On Σ-Protocols. [cited 2025 Dec 18]. Available from: http://www.daimi.au.dk/~ivan/Sigma.pdf. [Google Scholar]

20. Libert B, Peters T, Yung M. Group signatures with almost-for-free revocation. In: Advances in cryptology-CRYPTO 2012. LNCS 7417. Berlin/Heidelberg, Germany: Springer-Verlag; 2012. p. 571–89. [Google Scholar]

21. Ohara K, Emura K, Hanaoka G, Ishida A, Ohta K, Sakai Y. Shortening the Libert-Peters–Yung revocable group signature scheme by using the random oracle methodology. IEICE Trans Fundam. 2019;102-A(9):1101–17. [Google Scholar]

22. Emura K, Hayashi T. A revocable group signature scheme with scalability from simple assumptions. IEICE Trans Fundam. 2020;103-A(1):125–40. [Google Scholar]

23. Sadiah S, Nakanishi T. An efficient anonymous reputation system for crowdsensing. J Inf Process. 2022;30:694–705. [Google Scholar]


Cite This Article

APA Style
Sadiah, S., Nakanishi, T. (2026). A Distributed Anonymous Reputation System for V2X Communication. Computers, Materials & Continua, 87(1), 41. https://doi.org/10.32604/cmc.2025.073774
Vancouver Style
Sadiah S, Nakanishi T. A Distributed Anonymous Reputation System for V2X Communication. Comput Mater Contin. 2026;87(1):41. https://doi.org/10.32604/cmc.2025.073774
IEEE Style
S. Sadiah and T. Nakanishi, “A Distributed Anonymous Reputation System for V2X Communication,” Comput. Mater. Contin., vol. 87, no. 1, pp. 41, 2026. https://doi.org/10.32604/cmc.2025.073774


cc Copyright © 2026 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 309

    View

  • 60

    Download

  • 0

    Like

Share Link