Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard

Authors: Alexandra Boldyreva (Georgia Institute of Technology), Virendra Kumar (Qualcomm), Jiahao Sun

Volume: 2024
Issue: 4
Pages: 565–582
DOI: https://doi.org/10.56553/popets-2024-0130

Download PDF

Abstract: The paper provides the first provable security analysis of the Butterfly Key Mechanism (BKM) protocol from IEEE 1609.2.1 standard. The BKM protocol specifies a novel approach for efficiently requesting multiple certificates for use in vehicle-to-everything (V2X) communication. We define the main security goals of BKM, such as vehicle privacy and communication authenticity. We prove that the BKM protocol, with small modifications, meets those security goals. We also propose a way to significantly improve the protocol's efficiency without sacrificing security.

Keywords: V2X communication, butterfly key mechanism, digital certificates, vehicle privacy, unforgeability, provable security

Copyright in PoPETs articles are held by their authors. This article is published under a Creative Commons Attribution 4.0 license.