Identity-Based Key Management Scheme for Secure Discussion Group Establishment in DOSNs

被引:2
|
作者
Zhang, Lei [1 ,2 ,3 ]
Han, Wendie [1 ,2 ,3 ]
Zhang, Rui [1 ,2 ,3 ]
Wang, Lulu [1 ,2 ,3 ]
Meng, Xinyu [4 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[3] Minist Educ, Engn Res Ctr Software Hardware Codesign Technol &, Shanghai 200062, Peoples R China
[4] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
关键词
Distributed online social networks; key management; secure group communication; AGREEMENT; PRIVACY; EFFICIENT; PROTOCOL;
D O I
10.1109/TIFS.2023.3286712
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed online social network (DOSN) solves the challenges of single-point failure and user data privacy faced by traditional online social network (OSN). Online discussion group, allowing a user to facilitate the communications with other users, is one of the most important components of (D)OSN. Key management is the key technology to ensure the secure establishment of discussion groups in DOSNs. However, the existing key management schemes for secure discussion group establishment in DOSNs cannot meet the requirements of sender non-restriction, receiver controllability, round optimal, certificate freeness simultaneously. In this paper, we propose a novel key management scheme for secure discussion group establishment in DOSNs. In our scheme, any user could use our key management scheme to initialize a discussion group with a piece of discussion group information. Users who are interested in the group topic contained in the discussion group information can join and leave the discussion group at any time once the discussion group is initialized with one-round communication. Any user/sender can find the users that he/she wants to communicate with by looking up the discussion group information of a discussion group and then send encrypted messages to some or all of the users in the discussion group. Therefore, our scheme achieves sender non-restriction, receiver controllability, round optimal, certificate freeness simultaneously. Security analysis also shows that our scheme achieves confidentiality, authentication, full collusion resistance, known-key security and perfect forward security.
引用
收藏
页码:3706 / 3719
页数:14
相关论文
共 50 条
  • [31] A new identity-based conference key distribution scheme
    Xu, SB
    van Tilborg, H
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 269 - 269
  • [32] A Practical Key Issuing Scheme in Identity-based Cryptosystem
    Wang, Changji
    Liu, Jing
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 454 - 457
  • [33] Identity-based key-insulated signcryption scheme
    Wang, Huige
    Cao, Hao
    Li, Desheng
    Journal of Computational Information Systems, 2013, 9 (08): : 3067 - 3075
  • [34] CCA-Secure Deterministic Identity-Based Encryption Scheme
    Huang, Meijuan
    Yang, Bo
    Zhao, Yi
    Liang, Kaitai
    Xue, Liang
    Yang, Xiaoyi
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 245 - 269
  • [35] Secure Identity-Based Blind Signature Scheme in the Standard Model
    Hu, Xiao-Ming
    Huang, Shang-Teng
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (01) : 215 - 230
  • [36] Secure Identity-Based Blind Signature Scheme for Online Transactions
    Lunzhi Deng
    Xiuru He
    Tian Xia
    Wireless Personal Communications, 2021, 116 : 1525 - 1537
  • [37] A Tightly Secure Identity-Based Signature Scheme from Isogenies
    Chen, Jiawei
    Jo, Hyungrok
    Sato, Shingo
    Shikata, Junji
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 141 - 163
  • [38] A provable secure identity-based threshold proxy signcryption scheme
    Hu, D. (hdf666@163.com), 2013, CESER Publications, Post Box No. 113, Roorkee, 247667, India (51):
  • [39] An efficient and provable secure identity-based ring signcryption scheme
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1092 - 1097
  • [40] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):