Anonymous Certificateless Multireceiver Encryption Scheme for Mobile Communication Devices

被引:0
|
作者
Qu, Yunyun [1 ,2 ]
Zeng, Jiwen [1 ]
机构
[1] Xiamen Univ, Sch Math Sci, Xiamen 361005, Peoples R China
[2] Guizhou Normal Univ, Sch Math Sci, Guiyang 550001, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 01期
关键词
Games; Encryption; Public key; Read only memory; Mobile communication; Receivers; Privacy; Anonymity; certificateless multireceiver encryption (CLMRE); decisional Diffie-Hellman (DDH) problem; standard model (SM); IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; BROADCAST ENCRYPTION; SECURE; ENCAPSULATION;
D O I
10.1109/JSYST.2022.3173055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of wireless communication technologies and the popularity of mobile communication devices, people can easily access the Internet through their mobile communication devices. Compared with the traditional wired communication, this brings great convenience to people's lives, but at the same time, it also brings greater challenges in terms of security and privacy. In order to protect the confidentiality of the transmitted message and prevent the identity information of message recipients from being leaked, some certificateless multireceiver encryption (CLMRE) schemes that could realize the anonymity of the receivers have been proposed. But most of the proposed schemes are either under the random oracle model (ROM), or based on bilinear pairings and hash-to-point (HTP) operations, which lead to expensive operation costs in encryption or decryption. In the ROM, in order to gain the value of the hash function, the adversary makes a query to the challenger, but in the standard model (SM), the adversary can compute the hash function directly. The cryptographic scheme based on the SM has higher security than the cryptographic scheme based on the ROM. Therefore, it is very meaningful and necessary to design an efficient CLMRE scheme without bilinear pairings and HTP operations under the SM, which is suitable for mobile communication devices. In this article, we propose the first CLMRE scheme without bilinear parings and HTP operations in the SM, and we prove that this scheme is indistinguishable and anonymous against Type-I adversary $\mathcal {A}_\text{I}$ and Type-II adversary $\mathcal {A}_{\text{II}}$. Additionally, we compare our scheme's performance in calculation and communication with several previous schemes. The analysis shows that our novel scheme based on the SM is efficient in terms of calculation, communication, and it is suitable for mobile communication devices.
引用
收藏
页码:314 / 324
页数:11
相关论文
共 50 条
  • [41] Untraceable and Anonymous Mobile Payment Scheme Based on Near Field Communication
    Tso, Raylin
    [J]. SYMMETRY-BASEL, 2018, 10 (12):
  • [42] An efficient and secure anonymous authentication scheme for mobile satellite communication systems
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Hong, Jeong-Woo
    Yoon, Sang-Yoon
    Park, Dong-In
    Choi, Myung-Jin
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [43] Provably secure certificateless deniable authenticated encryption scheme
    Kar, Jayaprakash
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [44] Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
    Lin Cheng
    Qiaoyan Wen
    Zhengping Jin
    Hua Zhang
    [J]. Frontiers of Computer Science, 2014, 8 : 163 - 173
  • [45] An efficient and secure anonymous authentication scheme for mobile satellite communication systems
    Eun-Jun Yoon
    Kee-Young Yoo
    Jeong-Woo Hong
    Sang-Yoon Yoon
    Dong-In Park
    Myung-Jin Choi
    [J]. EURASIP Journal on Wireless Communications and Networking, 2011
  • [46] Provably secure certificateless encryption scheme in the standard model
    Deng, Lunzhi
    Xia, Tian
    He, Xiuru
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (06): : 2534 - 2553
  • [47] Lightweight searchable encryption scheme based on certificateless cryptosystem
    Yang, Xiaodong
    Chen, Guilan
    Wang, Meiding
    Pei, Xizhen
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 669 - 672
  • [48] Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
    Lin CHENG
    Qiaoyan WEN
    Zhengping JIN
    Hua ZHANG
    [J]. Frontiers of Computer Science, 2014, 8 (01) : 163 - 173
  • [49] A secure encryption scheme based on certificateless proxy signature
    Sudharani K.
    Sakthivel P.N.K.
    [J]. Sudharani, K. (ksudharani.shagthi@gmail.com), 2018, Inderscience Publishers (07) : 40 - 64
  • [50] Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
    Cheng, Lin
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (01) : 163 - 173