×

zbMATH — the first resource for mathematics

Efficient certificateless anonymous multi-receiver encryption scheme without bilinear parings. (English) Zbl 1426.94101
Summary: With the growing development of Internet technology and popularization of mobile devices, we easily access the Internet anytime and anywhere by mobile devices. It has brought great convenience for our lives. But it brought more challenges than traditional wired communication, such as confidentiality and privacy. In order to improve security and privacy protection in using mobile network, numerous multi-receiver identity-based encryption schemes have been proposed with bilinear pairing and probabilistic hap-to-point (HTP) function. To address the troubles of private key escrow in multi-receiver encryption scheme based on ID-PKC, recently, some certificateless anonymous multi-receiver encryption (CLAMRE) schemes are introduced. But previous CLAMRE schemes using the bilinear pairing are not suitable to mobile device because the use of bilinear pairing and probabilistic hash-to-point (HTP) function results in expensive operation costs in encryption or decryption. In this paper, we propose an efficient CLAMRE scheme using elliptic curve cryptography (ECC) without bilinear pairing and HTP hash function. Since our scheme does not use bilinear pairing and HTP operation during the encryption and decryption process, the proposed CLAMRE scheme has much less computation cost than the latest CLAMRE schemes. Performance analysis shows that runtime of our scheme is much less when the sender generates ciphertext, compared with existing schemes. Security analysis shows proposed CLAMRE scheme provides confidentiality of message and receiver anonymity under the random oracle model with the difficulties of decision Diffie-Hellman problem and against the adversaries defined in CL-PKC system.

MSC:
94A60 Cryptography
94A62 Authentication, digital signatures and secret sharing
68P25 Data encryption (aspects in computer science)
PDF BibTeX XML Cite
Full Text: DOI
References:
[1] Fu, Z.; Ren, K.; Shu, J.; Sun, X.; Huang, F., Enabling personalized search over encrypted outsourced data with efficiency improvement, IEEE Transactions on Parallel and Distributed Systems, 27, 9, 2546-2559, (2016)
[2] Fu, Z.; Sun, X.; Liu, Q.; Zhou, L.; Shu, J., Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing, IEICE Transactions on Communications, E98B, 1, 190-200, (2015)
[3] Xia, Z.; Wang, X.; Sun, X.; Liu, Q.; Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data, IEEE Transactions on Parallel and Distributed Systems, 27, 2, 340-352, (2016)
[4] Huang, X.; Xiang, Y.; Bertino, E.; Zhou, J.; Xu, L., Robust multi-factor authentication for fragile communications, IEEE Transactions on Dependable and Secure Computing, 11, 6, 568-581, (2014)
[5] Guo, P.; Wang, J.; Li, B.; Lee, S., A variable threshold-value authentication architecture for wireless mesh networks, Journal of Internet Technology, 15, 6, 929-935, (2014)
[6] Shen, J.; Tan, H.; Wang, J.; Wang, J.; Lee, S., A novel routing protocol providing good transmission reliability in underwater sensor networks, Journal of Internet Technology, 16, 1, 171-178, (2015)
[7] Huang, X.; Xiang, Y.; Chonka, A.; Zhou, J.; Deng, R. H., A generic framework for three-factor authentication: Preserving security and privacy in distributed systems, IEEE Transactions on Parallel and Distributed Systems, 22, 8, 1390-1397, (2011)
[8] Ren, Y.; Shen, J.; Wang, J.; Han, J.; Lee, S., Mutual verifiable provable data auditing in public cloud storage, Journal of Internet Technology, 16, 2, 317-323, (2015)
[9] Wang, J.; Chen, X.; Huang, X.; You, I.; Xiang, Y., Verifiable auditing for outsourced database in cloud computing, Institute of Electrical and Electronics Engineers. Transactions on Computers, 64, 11, 3293-3303, (2015) · Zbl 1360.68187
[10] Lee, C.-C.; Lai, Y.-M.; Chen, C.-L.; Chen, L. A., A novel designated verifier signature scheme based on bilinear pairing, Information Technology and Control, 42, 3, 247-252, (2013)
[11] Kurosawa, K., Multi-recipient Public-Key Encryption with Shortened Ciphertext, Public Key Cryptography. Public Key Cryptography, Lecture Notes in Computer Science, 2274, 48-63, (2002), Berlin, Germany: Springer, Berlin, Germany · Zbl 1055.94522
[12] Bellare, M.; Boldyreva, A.; Micali, S.; Preneel, B., Public-key encryption in a multi-user setting: security proofs and improvements, Advances in Cryptology—(EUROCRYPT ’2000). Advances in Cryptology—(EUROCRYPT ’2000), Lecture Notes in Computer Science, 1807, 259-274, (2000), Berlin, Germany: Springer, Berlin, Germany · Zbl 1082.94504
[13] Dodis, Y.; Fazio, N.; Feigenbaum, J., Public key broadcast encryption for stateless receivers, Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop. Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, Lecture Notes in Computer Science, 2696, 61-80, (2003), Berlin, Germany: Springer, Berlin, Germany · Zbl 1327.94041
[14] Kurosawa, K., Multi-recipient Public-Key Encryption with Shortened Ciphertext, Public Key Cryptography. Public Key Cryptography, Lecture Notes in Computer Science, 2274, 48-63, (2002), Berlin, Germany: Springer Berlin Heidelberg, Berlin, Germany · Zbl 1055.94522
[15] Bellare, M.; Boldyreva, A.; Pointcheval, D., Multirecipient encryption schemes: security notions and randomness re-use, Proceedings of the Advances in Cryptology (PKC 03, LNCS 2567
[16] Baek, J.; Safavi-Naini, R.; Susilo, W., Efficient multi-receiver identity-based encryption and its application to broadcast encryption, Public key cryptography—PKC 2005. Public key cryptography—PKC 2005, Lecture Notes in Computer Science, 3386, 380-397, (2005), Berlin, Germany: Springer, Berlin, Germany · Zbl 1081.94516
[17] Chatterjee, S.; Sarkar, P., Multi-receiver identity-based key encapsulation with shortened ciphertext, Progress in cryptology—INDOCRYPT 2006. Progress in cryptology—INDOCRYPT 2006, Lecture Notes in Computer Science, 4329, 394-408, (2006), Berlin, Germany: Springer, Berlin, Germany · Zbl 1175.94107
[18] Park, J. H.; Lee, D. H., Security analysis of a multi-receiver identity-based key encapsulation mechanism, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E92-A, 1, 329-331, (2009)
[19] Wang, H.; Zeng, P.; Choo, K.-K. R., MDMR-IBE: Efficient multiple domain multi-receiver identity-based encryption, Security and Communication Networks, 7, 11, 1641-1651, (2014)
[20] Fan I, C.; Huang Y, L.; Ho P, H., Anonymous multireceiver identity-based encryption, IEEE Transactions on Computers, 59, 9, 1239-1249, (2010) · Zbl 1366.94489
[21] Chien, H.-Y., Improved anonymous multi-receiver identity-based encryption, The Computer Journal, 55, 4, 439-446, (2012)
[22] Wang, H., Insecurity of improved anonymous multi-receiver identity-based encryption, The Computer Journal, 57, 4, 636-638, (2014)
[23] Zhang, J.; Mao, J., An improved anonymous multi-receiver identity-based encryption scheme, International Journal of Communication Systems, 28, 4, 645-658, (2015)
[24] Al-Riyami, S. S.; Paterson, K. G., Certificateless public key cryptography, Advances in Cryptology-ASIACRYPT. Advances in Cryptology-ASIACRYPT, Lecture Notes in Computer Science, 2894, 452-473, (2003), Springer · Zbl 1205.94072
[25] Chen, Y.; Xu, W.; Xiong, H., Strongly secure certificateless key-insulated signature secure in the standard model, Annals of Telecommunications-Annales des Télécommunications, 70, 9-10, 395-405, (2015)
[26] Du, H.; Wen, Q., Certificateless proxy multi-signature, Information Sciences, 276, 21-30, (2014) · Zbl 1341.94019
[27] Islam, S. H.; Khan, M. K.; Al-Khouri, A. M., Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing, Security and Communication Networks, 8, 13, 2214-2231, (2015)
[28] Hung, Y.; Huang, S.; Tseng, Y.; Tsai, T., Efficient Anonymous Multireceiver Certificateless Encryption, IEEE Systems Journal, 11, 4, 2602-2613, (2017)
[29] He, D.; Wang, H.; Wang, L.; Shen, J.; Yang, X., Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices, Soft Computing, 21, 22, 6801-6810, (2017)
[30] He, D.; Zeadally, S.; Kumar, N.; Wu, W., Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures, IEEE Transactions on Information Forensics and Security, 11, 9, 2052-2064, (2016)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.