Skip to main content

2018 | OriginalPaper | Buchkapitel

Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data

verfasst von : Xuguang Wu, Yiliang Han, Minqing Zhang, Shuaishuai Zhu

Erschienen in: Information Security and Cryptology

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In big data environment, the quantity of generated and stored data is huge, and the size is larger than before. A general solution to encrypt large messages is to adopt the hybrid encryption method, that is, one uses an asymmtric cryptosystem to encrypt the symmetric key, and needs a symmetric cryptosystem to encrypt the real message. To eliminate this requirement for an additional cryptosystem, a parallel long message encryption scheme based on certificateless cryptosystem is proposed, which eliminates the needs for public key certificates, and avoids the key escrow problem. In combination with parallel computer hardware, we further improve the performance. The simulation results show that it can make full use of CPU resources and has high efficiency advantages. In the random oracle model, the presented scheme is secure in a One-Way Encryption (OWE) model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hashem, I.A.T., Chang, V., Anuar, N.B., Adewole, K., Yaqoob, I., Gani, A., Ahmed, E., Chiroma, H.: The role of big data in smart city. Int. J. Inf. Manage. 36(5), 748–758 (2016)CrossRef Hashem, I.A.T., Chang, V., Anuar, N.B., Adewole, K., Yaqoob, I., Gani, A., Ahmed, E., Chiroma, H.: The role of big data in smart city. Int. J. Inf. Manage. 36(5), 748–758 (2016)CrossRef
2.
Zurück zum Zitat Hamlin, A., Schear, N., Shen, E., Varia, M., Yakoubov, S., Yerukhimovich, A.: Cryptography for big data security. Big Data Storage Sharing Secur. 3S, 241–288 (2016)CrossRef Hamlin, A., Schear, N., Shen, E., Varia, M., Yakoubov, S., Yerukhimovich, A.: Cryptography for big data security. Big Data Storage Sharing Secur. 3S, 241–288 (2016)CrossRef
3.
Zurück zum Zitat Gurrin, C., Smeaton, A.F., Doherty, A.R.: Lifelogging: personal big data. Found. Trends Inf. Retr. 8(1), 1–125 (2014)CrossRef Gurrin, C., Smeaton, A.F., Doherty, A.R.: Lifelogging: personal big data. Found. Trends Inf. Retr. 8(1), 1–125 (2014)CrossRef
4.
Zurück zum Zitat Chen, M., Mao, S., Liu, Y.: Big data: a survey. Mob. Netw. Appl. 19(2), 171–209 (2014)CrossRef Chen, M., Mao, S., Liu, Y.: Big data: a survey. Mob. Netw. Appl. 19(2), 171–209 (2014)CrossRef
6.
Zurück zum Zitat Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(1), 96–99 (1983)CrossRefMATH Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(1), 96–99 (1983)CrossRefMATH
7.
Zurück zum Zitat ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)MathSciNetCrossRefMATH ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)MathSciNetCrossRefMATH
8.
Zurück zum Zitat Waters, B.: Efficient identity-based encryption without random oracles. Eurocrypt 3494, 114–127 (2005)MathSciNetMATH Waters, B.: Efficient identity-based encryption without random oracles. Eurocrypt 3494, 114–127 (2005)MathSciNetMATH
10.
Zurück zum Zitat Hwang, M.S., Chang, C.C., Hwang, K.F.: An ElGamal-like cryptosystem for enciphering large messages. IEEE Trans. Knowl. Data Eng. 14(2), 445–446 (2002)CrossRefMATH Hwang, M.S., Chang, C.C., Hwang, K.F.: An ElGamal-like cryptosystem for enciphering large messages. IEEE Trans. Knowl. Data Eng. 14(2), 445–446 (2002)CrossRefMATH
11.
Zurück zum Zitat Zhong, S.: An efficient and secure cryptosystem for encrypting long messages. Fundam. Informaticae 71(4), 493–497 (2006)MathSciNetMATH Zhong, S.: An efficient and secure cryptosystem for encrypting long messages. Fundam. Informaticae 71(4), 493–497 (2006)MathSciNetMATH
12.
Zurück zum Zitat Wang, M.N., Yen, S.M., Wu, C.D., Lin, C.T.: Cryptanalysis on an Elgamal-like cryptosystem for encrypting large messages. In: Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications, pp. 418–422 (2006) Wang, M.N., Yen, S.M., Wu, C.D., Lin, C.T.: Cryptanalysis on an Elgamal-like cryptosystem for encrypting large messages. In: Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications, pp. 418–422 (2006)
13.
Zurück zum Zitat Chang, T.Y., Hwang, M.S., Yang, W.P.: Cryptanalysis on an improved version of ElGamal-like public-key encryption scheme for encrypting large messages. Informatica 23(4), 537–562 (2012)MathSciNetMATH Chang, T.Y., Hwang, M.S., Yang, W.P.: Cryptanalysis on an improved version of ElGamal-like public-key encryption scheme for encrypting large messages. Informatica 23(4), 537–562 (2012)MathSciNetMATH
14.
Zurück zum Zitat Jena, D., Panigrahy, S.K., Jena, S.K.: A novel and efficient cryptosystem for long message encryption. In: Proceedings of International Conference on Industrial and Information Systems, p. 79 (2009) Jena, D., Panigrahy, S.K., Jena, S.K.: A novel and efficient cryptosystem for long message encryption. In: Proceedings of International Conference on Industrial and Information Systems, p. 79 (2009)
15.
Zurück zum Zitat Yang, G., Liu, J.: Threshold public key cryptosystem for encrypting long messages. J. Comput. Inf. Syst. 11(2), 671–681 (2015) Yang, G., Liu, J.: Threshold public key cryptosystem for encrypting long messages. J. Comput. Inf. Syst. 11(2), 671–681 (2015)
16.
Zurück zum Zitat Liu, J., Zhong, S., Han, L., Yao, H.: An identity-based cryptosystem for encrypting long messages. Int. J. Innov. Comput. Inf. Control 7(6), 3295–3301 (2011) Liu, J., Zhong, S., Han, L., Yao, H.: An identity-based cryptosystem for encrypting long messages. Int. J. Innov. Comput. Inf. Control 7(6), 3295–3301 (2011)
17.
Zurück zum Zitat Ferguson, N., Schneier, B., Kohno, T.: Cryptography engineering: design principles and practical applications (2011) Ferguson, N., Schneier, B., Kohno, T.: Cryptography engineering: design principles and practical applications (2011)
18.
Zurück zum Zitat Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. Asiacrypt 2894, 452–473 (2003)MathSciNetMATH Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. Asiacrypt 2894, 452–473 (2003)MathSciNetMATH
20.
Zurück zum Zitat Han, Y., Gui, X., Wu, X.: Parallel multi-recipient signcryption for imbalanced wireless networks. Int. J. Innov. Comput. Inf. Control 6(8), 3621–3630 (2010) Han, Y., Gui, X., Wu, X.: Parallel multi-recipient signcryption for imbalanced wireless networks. Int. J. Innov. Comput. Inf. Control 6(8), 3621–3630 (2010)
21.
Zurück zum Zitat Zhang, M., Wu, X., Han, Y., Guo, Y.: Secure group communication based on distributed parallel ID-based proxy re-encryption. In: 2013 32nd Chinese Control Conference (CCC), pp. 6364–6367 (2013) Zhang, M., Wu, X., Han, Y., Guo, Y.: Secure group communication based on distributed parallel ID-based proxy re-encryption. In: 2013 32nd Chinese Control Conference (CCC), pp. 6364–6367 (2013)
25.
Zurück zum Zitat Di Crescenzo, G., Ostrovsky, R., Rajagopalan, S.: Conditional oblivious transfer and timed-release encryption. EuroCrypt 99, 74–89 (1999)MathSciNetMATH Di Crescenzo, G., Ostrovsky, R., Rajagopalan, S.: Conditional oblivious transfer and timed-release encryption. EuroCrypt 99, 74–89 (1999)MathSciNetMATH
26.
Zurück zum Zitat Barbosa, M., Farshim, P.: Certificateless signcryption. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. ACM (2008) Barbosa, M., Farshim, P.: Certificateless signcryption. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. ACM (2008)
Metadaten
Titel
Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data
verfasst von
Xuguang Wu
Yiliang Han
Minqing Zhang
Shuaishuai Zhu
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-75160-3_14

Premium Partner