Skip to main content
Erschienen in: Soft Computing 1/2020

24.09.2019 | Foundations

Anonymous certificateless multi-receiver encryption scheme for smart community management systems

verfasst von: Lunzhi Deng

Erschienen in: Soft Computing | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In community management services, it is a common requirement for management centers to send the same encrypted message to some units and individuals in the community, while avoiding the leakage of personal information of the user. In order to achieve this goal safely and efficiently, the multi-receiver encryption is a good option. In the setting, a sender generates the ciphertext for a designed group of receivers. Any receiver in the group can obtain the plaintext by decrypting the ciphertext using his own private key, and the true identity of the receiver is kept secret to anyone including other receivers. Recently, several certificateless multi-receiver encryption (CLMRE) schemes have been introduced, and all of them are proved to be secure in the random oracles model (ROM). ROM is a simulation of the hash function and can not replace the real hash function computation. In this paper, a new CLMRE scheme is constructed and it is proved to be secure based on decision bilinear Diffie–Hellman problem in the standard model (SM). It achieves the anonymity of the receivers and is suitable for smart community management systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Al-Riyami S, Paterson K (2003) Certificateless public cryptography. In: Advances in cryptology-ASIACRYPT 2003, LNCS, vol 2894, pp 452–473 Al-Riyami S, Paterson K (2003) Certificateless public cryptography. In: Advances in cryptology-ASIACRYPT 2003, LNCS, vol 2894, pp 452–473
Zurück zum Zitat Baek J, Safavi-Naini R, Susilo W (2005a) Certificateless public key encryption without pairing. In: International conference on information security 2005, LNCS, vol 3650, pp 134–148 Baek J, Safavi-Naini R, Susilo W (2005a) Certificateless public key encryption without pairing. In: International conference on information security 2005, LNCS, vol 3650, pp 134–148
Zurück zum Zitat Baek J, Safavi-Naini R, Susilo, W (2005b) Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: International workshop on public key cryptography 2005, LNCS, vol 3386. pp 380–397MATH Baek J, Safavi-Naini R, Susilo, W (2005b) Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: International workshop on public key cryptography 2005, LNCS, vol 3386. pp 380–397MATH
Zurück zum Zitat Chatterjee S, Sarkar P (2006) Multi-receiver identity-based key encapsulation with shortened ciphertext. In: International conference on cryptology in India 2006, LNCS, vol 4329, pp 394-408 Chatterjee S, Sarkar P (2006) Multi-receiver identity-based key encapsulation with shortened ciphertext. In: International conference on cryptology in India 2006, LNCS, vol 4329, pp 394-408
Zurück zum Zitat Cheng L, Wen Q, Jin Z, Zhang H (2014) Cryptanalysis and improvement of a certificateless encryption scheme in the standard model. Front Comput Sci-Chi 8(1):163–173MathSciNetMATH Cheng L, Wen Q, Jin Z, Zhang H (2014) Cryptanalysis and improvement of a certificateless encryption scheme in the standard model. Front Comput Sci-Chi 8(1):163–173MathSciNetMATH
Zurück zum Zitat Chien H (2012) Improved anonymous multi-receiver identity-based encryption. Comput J 55(4):439–446 Chien H (2012) Improved anonymous multi-receiver identity-based encryption. Comput J 55(4):439–446
Zurück zum Zitat Deng L, Zeng J, Wang X (2017) An improved certificateless encryption scheme for telecare medicine information systems. J Internet Technol 18(2):223–227 Deng L, Zeng J, Wang X (2017) An improved certificateless encryption scheme for telecare medicine information systems. J Internet Technol 18(2):223–227
Zurück zum Zitat Deng L, Yang Y, Gao R, Chen Y (2018) Certificateless short signature scheme from pairing in the standard model. Int J Commun Syst e3796:1–8 Deng L, Yang Y, Gao R, Chen Y (2018) Certificateless short signature scheme from pairing in the standard model. Int J Commun Syst e3796:1–8
Zurück zum Zitat Deng L, Yang Y, Gao R (2019) Certificateless short aggregate signature scheme for mobile devices. IEEE Access 7:87162–87168 Deng L, Yang Y, Gao R (2019) Certificateless short aggregate signature scheme for mobile devices. IEEE Access 7:87162–87168
Zurück zum Zitat Dent A, Libert B, Paterson K (2008) Certificateless encryption schemes strongly secure in the standard model. In: International workshop on public key cryptography 2008, LNCS, vol 4939, pp 344–359 Dent A, Libert B, Paterson K (2008) Certificateless encryption schemes strongly secure in the standard model. In: International workshop on public key cryptography 2008, LNCS, vol 4939, pp 344–359
Zurück zum Zitat Fan C, Huang L, Ho P (2010) Anonymous multireceiver identity-based encryption. IEEE Tran Comput 59(9):1239–1249MathSciNetMATH Fan C, Huang L, Ho P (2010) Anonymous multireceiver identity-based encryption. IEEE Tran Comput 59(9):1239–1249MathSciNetMATH
Zurück zum Zitat Gao R, Zeng J, Deng L (2018) Efficient certificateless anonymous multi-Receiver encryption scheme without bilinear parings. Math Probl Eng, 1486437, 13 pages Gao R, Zeng J, Deng L (2018) Efficient certificateless anonymous multi-Receiver encryption scheme without bilinear parings. Math Probl Eng, 1486437, 13 pages
Zurück zum Zitat Guo R, Wen Q, Shi H, Jin Z, Zhang H (2013) An efficient and provably secure certificateless public key encryption scheme for telecare medicine information systems. J Med Syst 37(5):9965 Guo R, Wen Q, Shi H, Jin Z, Zhang H (2013) An efficient and provably secure certificateless public key encryption scheme for telecare medicine information systems. J Med Syst 37(5):9965
Zurück zum Zitat Hafizul SK, Muhammad K, Ali M, Al (2015) Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur Commun Netw 8(13):2214–2231 Hafizul SK, Muhammad K, Ali M, Al (2015) Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur Commun Netw 8(13):2214–2231
Zurück zum Zitat He K, Weng J, Mao Y, Yuan H (2017a) Anonymous identity-based broadcast encryption technology for smart city information system. Pers Ubiquitous Comput 21(5):841–853 He K, Weng J, Mao Y, Yuan H (2017a) Anonymous identity-based broadcast encryption technology for smart city information system. Pers Ubiquitous Comput 21(5):841–853
Zurück zum Zitat He D, Wang H, Wang L, Shen J, Yang X (2017b) Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices. Soft Comput 21(22):6801–6810 He D, Wang H, Wang L, Shen J, Yang X (2017b) Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices. Soft Comput 21(22):6801–6810
Zurück zum Zitat Huang Q, Wong D (2007) Generic certificateless encryption in the standard model. In: International workshop on security 2007, LNCS, vol 4752, pp 278–291 Huang Q, Wong D (2007) Generic certificateless encryption in the standard model. In: International workshop on security 2007, LNCS, vol 4752, pp 278–291
Zurück zum Zitat Hung Y, Huang S, Tseng Y, Tsai T (2017) Efficient anonymous multireceiver certificateless encryption. IEEE Syst J 11(4):2602–2613 Hung Y, Huang S, Tseng Y, Tsai T (2017) Efficient anonymous multireceiver certificateless encryption. IEEE Syst J 11(4):2602–2613
Zurück zum Zitat Hur J, Park C, Hwang S (2012) Privacy-preserving identity-based broadcast encryption. Inf Fusion 13(4):296–303 Hur J, Park C, Hwang S (2012) Privacy-preserving identity-based broadcast encryption. Inf Fusion 13(4):296–303
Zurück zum Zitat Hwang Y, Liu J, Chow S (2008) Certificateless public key encryption secure against malicious KGC attacks in the standard model. J Univers Comput Sci 14(3):463–480MathSciNetMATH Hwang Y, Liu J, Chow S (2008) Certificateless public key encryption secure against malicious KGC attacks in the standard model. J Univers Comput Sci 14(3):463–480MathSciNetMATH
Zurück zum Zitat Kim I, Hwang S (2013) An optimal identity-based broadcast encryption scheme for wireless sensor networks. IEICE Trans Commun E96B(3):891–895 Kim I, Hwang S (2013) An optimal identity-based broadcast encryption scheme for wireless sensor networks. IEICE Trans Commun E96B(3):891–895
Zurück zum Zitat Kim I, Hwang S, Kim S (2012) An efficient anonymous identity-based broadcast encryption for large-scale wireless sensor networks. Ad Hoc Sens Wirel Netw 14(1–2):27–39 Kim I, Hwang S, Kim S (2012) An efficient anonymous identity-based broadcast encryption for large-scale wireless sensor networks. Ad Hoc Sens Wirel Netw 14(1–2):27–39
Zurück zum Zitat Kim J, Susilo W, Au M, Seberry J (2015) Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext. IEEE Trans Inf Forensics Secur 10(3):679–693 Kim J, Susilo W, Au M, Seberry J (2015) Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext. IEEE Trans Inf Forensics Secur 10(3):679–693
Zurück zum Zitat Lai J, Mu Y, Guo F, Jiang P, Ma S (2018) Identity-based broadcast encryption for inner products. Comput J 61(8):1240–1251MathSciNet Lai J, Mu Y, Guo F, Jiang P, Ma S (2018) Identity-based broadcast encryption for inner products. Comput J 61(8):1240–1251MathSciNet
Zurück zum Zitat Li J, Yu Q, Zhang Y (2018) Identity-based broadcast encryption with continuous leakage resilience. Inf Sci 429:177–193MathSciNet Li J, Yu Q, Zhang Y (2018) Identity-based broadcast encryption with continuous leakage resilience. Inf Sci 429:177–193MathSciNet
Zurück zum Zitat Libert B, Quisquater J (2006) On constructing certificateless cryptosystems from identity based encryption. In: International workshop on public key cryptography, LNCS, vol 3958, pp 474–490 Libert B, Quisquater J (2006) On constructing certificateless cryptosystems from identity based encryption. In: International workshop on public key cryptography, LNCS, vol 3958, pp 474–490
Zurück zum Zitat Meshram C, Li X (2018) New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group. J Inf Optim Sci 39(2):391–400MathSciNet Meshram C, Li X (2018) New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group. J Inf Optim Sci 39(2):391–400MathSciNet
Zurück zum Zitat Meshram C, Tseng Y, Lee C, Meshram S (2017a) An IND-ID-CPA secure ID-based cryptographic protocol using GDLP and IFP. Informatica Lithuan 28(3):471–484MathSciNetMATH Meshram C, Tseng Y, Lee C, Meshram S (2017a) An IND-ID-CPA secure ID-based cryptographic protocol using GDLP and IFP. Informatica Lithuan 28(3):471–484MathSciNetMATH
Zurück zum Zitat Meshram C, Lee C, Li C, Chen C (2017b) A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft Comput 21(24):7285–7291 Meshram C, Lee C, Li C, Chen C (2017b) A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft Comput 21(24):7285–7291
Zurück zum Zitat Meshram C, Powar P, Obaidat M, Lee C, Meshram S (2018) Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs. IET Netw 7(6):363–367 Meshram C, Powar P, Obaidat M, Lee C, Meshram S (2018) Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs. IET Netw 7(6):363–367
Zurück zum Zitat Meshram C, Li C, Meshram S (2019b) An efficient online/offline ID-based short signature procedure using extended chaotic maps. Soft Comput 23(3):747–753MATH Meshram C, Li C, Meshram S (2019b) An efficient online/offline ID-based short signature procedure using extended chaotic maps. Soft Comput 23(3):747–753MATH
Zurück zum Zitat Meshram C, Lee C, Meshram S, Li C (2019c) An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937–6946MATH Meshram C, Lee C, Meshram S, Li C (2019c) An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937–6946MATH
Zurück zum Zitat Ming Y, Wang Y (2016) Identity based broadcast encryption with group of prime order. Int Arab J Inf Technol 13(5):531–541MathSciNet Ming Y, Wang Y (2016) Identity based broadcast encryption with group of prime order. Int Arab J Inf Technol 13(5):531–541MathSciNet
Zurück zum Zitat Park J, Lee D (2009) Security analysis of a multireceiver identity-based key encapsulation mechanism. IEICE Trans Fundam Electron Commun Comput Sci 92(1):329–331 Park J, Lee D (2009) Security analysis of a multireceiver identity-based key encapsulation mechanism. IEICE Trans Fundam Electron Commun Comput Sci 92(1):329–331
Zurück zum Zitat Reza S, Ron S, Josef P (2014) Lattice-based certificateless public-key encryption in the standard model. Int J Inf Secur 13(4):315–333 Reza S, Ron S, Josef P (2014) Lattice-based certificateless public-key encryption in the standard model. Int J Inf Secur 13(4):315–333
Zurück zum Zitat Shamir A (1984) Identity-based cryptosystem and signature scheme. In: Advances in cryptology-crypto 1984. LNCS, vol 196, pp 47–53 Shamir A (1984) Identity-based cryptosystem and signature scheme. In: Advances in cryptology-crypto 1984. LNCS, vol 196, pp 47–53
Zurück zum Zitat Shen L, Zhang F, Sun Y, Li S (2012) Cryptanalysis of a certificateless encryption scheme in the standard model. In: Fourth international conference on intelligent networking and collaborative systems 2012, pp 329–333 Shen L, Zhang F, Sun Y, Li S (2012) Cryptanalysis of a certificateless encryption scheme in the standard model. In: Fourth international conference on intelligent networking and collaborative systems 2012, pp 329–333
Zurück zum Zitat Sun Y, Li H (2010) Short-ciphertext and BDH-based CCA2 secure certificateless encryption. Sci China Inf Sci 53(10):2005–2015MathSciNet Sun Y, Li H (2010) Short-ciphertext and BDH-based CCA2 secure certificateless encryption. Sci China Inf Sci 53(10):2005–2015MathSciNet
Zurück zum Zitat Sun Y, Zhang F, Baek J (2007) Strongly secure certificateless public key encryption without pairing, In: International conference on cryptology and network security 2007, LNCS, vol 4856, pp 194–208 Sun Y, Zhang F, Baek J (2007) Strongly secure certificateless public key encryption without pairing, In: International conference on cryptology and network security 2007, LNCS, vol 4856, pp 194–208
Zurück zum Zitat Wang H, Zhang Y, Xiong H, Qin B (2012) Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Inf Secur 6(1):20–27 Wang H, Zhang Y, Xiong H, Qin B (2012) Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Inf Secur 6(1):20–27
Zurück zum Zitat Wang H, Zeng H, Choo K (2014) MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption. Secur Commun Netw 7(11):1641–1651 Wang H, Zeng H, Choo K (2014) MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption. Secur Commun Netw 7(11):1641–1651
Zurück zum Zitat Xu K, Liao Y, Qiao L, Liu Z, Yang X (2015) An identity-based (IDB) broadcast encryption scheme with personalized messages (BEPM). PLoS ONE 10(12):e0143975 Xu K, Liao Y, Qiao L, Liu Z, Yang X (2015) An identity-based (IDB) broadcast encryption scheme with personalized messages (BEPM). PLoS ONE 10(12):e0143975
Zurück zum Zitat Yan X, Gong P, Bai Z, Wang J, Li P (2013) New certificateless public key encryption scheme without pairing. IET Inf Secur 7(4):271–276 Yan X, Gong P, Bai Z, Wang J, Li P (2013) New certificateless public key encryption scheme without pairing. IET Inf Secur 7(4):271–276
Zurück zum Zitat Zhang J, Mao J (2015) An improved anonymous multi-receiver identity-based encryption scheme. Int J Commun Syst 28(4):645–658MathSciNet Zhang J, Mao J (2015) An improved anonymous multi-receiver identity-based encryption scheme. Int J Commun Syst 28(4):645–658MathSciNet
Zurück zum Zitat Zhang M, Takagi T (2013) Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group e-mail system with privacy preservation. IEEE Syst J 7(3):410–419 Zhang M, Takagi T (2013) Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group e-mail system with privacy preservation. IEEE Syst J 7(3):410–419
Zurück zum Zitat Zhang G, Wang X (2009) Certificateless encryption scheme secure in standard model. Tsinghua Sci Technol 14(4):452–459MathSciNetMATH Zhang G, Wang X (2009) Certificateless encryption scheme secure in standard model. Tsinghua Sci Technol 14(4):452–459MathSciNetMATH
Zurück zum Zitat Zhang L, Wu Q, Hu Y (2011) New constructions of identity-based broadcast encryption without random oracles. KSII Trans Internet Inf 5(2):428–439 Zhang L, Wu Q, Hu Y (2011) New constructions of identity-based broadcast encryption without random oracles. KSII Trans Internet Inf 5(2):428–439
Zurück zum Zitat Zhang L, Hub Y, Wu Q (2012) Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups. Math Comput Model Dyn 55(1–2):12–18MathSciNetMATH Zhang L, Hub Y, Wu Q (2012) Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups. Math Comput Model Dyn 55(1–2):12–18MathSciNetMATH
Zurück zum Zitat Zhao X, Zhang F (2012) Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority. J Syst Softw 85(3):708–716MathSciNet Zhao X, Zhang F (2012) Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority. J Syst Softw 85(3):708–716MathSciNet
Zurück zum Zitat Zhou Y, Yang B (2018) Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing. Inf Process Lett 130:16–24MathSciNetMATH Zhou Y, Yang B (2018) Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing. Inf Process Lett 130:16–24MathSciNetMATH
Metadaten
Titel
Anonymous certificateless multi-receiver encryption scheme for smart community management systems
verfasst von
Lunzhi Deng
Publikationsdatum
24.09.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 1/2020
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-04375-8

Weitere Artikel der Ausgabe 1/2020

Soft Computing 1/2020 Zur Ausgabe