Anonymous certificateless multi-receiver encryption scheme for smart community management systems

In community management services, it is a common requirement for management centers to send the same encrypted message to some units and individuals in the community, while avoiding the leakage of personal information of the user. In order to achieve this goal safely and efficiently, the multi-receiver encryption is a good option. In the setting, a sender generates the ciphertext for a designed group of receivers. Any receiver in the group can obtain the plaintext by decrypting the ciphertext using his own private key, and the true identity of the receiver is kept secret to anyone including other receivers. Recently, several certificateless multi-receiver encryption (CLMRE) schemes have been introduced, and all of them are proved to be secure in the random oracles model (ROM). ROM is a simulation of the hash function and can not replace the real hash function computation. In this paper, a new CLMRE scheme is constructed and it is proved to be secure based on decision bilinear Diffie–Hellman problem in the standard model (SM). It achieves the anonymity of the receivers and is suitable for smart community management systems.

[1]  Qing Wu,et al.  Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups , 2012, Math. Comput. Model..

[2]  Hui Li,et al.  Short-ciphertext and BDH-based CCA2 secure certificateless encryption , 2010, Science China Information Sciences.

[3]  Chun-I Fan,et al.  Anonymous Multireceiver Identity-Based Encryption , 2010, IEEE Transactions on Computers.

[4]  Lunzhi Deng,et al.  An Improved Certificateless Encryption Scheme for Telecare Medicine Information Systems , 2017 .

[5]  Yongjian Liao,et al.  An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM) , 2015, PloS one.

[6]  Jennifer Seberry,et al.  Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext , 2015, IEEE Transactions on Information Forensics and Security.

[7]  Yang Ming,et al.  Identity based broadcast encryption with group of prime order , 2016, Int. Arab J. Inf. Technol..

[8]  Qing Wu,et al.  New Constructions of Identity-based Broadcast Encryption without Random Oracles , 2011, KSII Trans. Internet Inf. Syst..

[9]  Ron Steinfeld,et al.  Lattice-based certificateless public-key encryption in the standard model , 2013, International Journal of Information Security.

[10]  Huaqun Wang,et al.  Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme , 2012, IET Inf. Secur..

[11]  Kim-Kwang Raymond Choo,et al.  MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption , 2014, Secur. Commun. Networks.

[12]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[13]  Joonsang Baek,et al.  Certificateless Public Key Encryption Without Pairing , 2005, ISC.

[14]  Peng Jiang,et al.  Identity-Based Broadcast Encryption for Inner Products , 2018, Comput. J..

[15]  Xiaoyun Wang,et al.  Certificateless Encryption Scheme Secure in Standard Model , 2009 .

[16]  Dong Hoon Lee,et al.  Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism , 2009, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[17]  Kenneth G. Paterson,et al.  Certificateless Encryption Schemes Strongly Secure in the Standard Model , 2008, Public Key Cryptography.

[18]  Bo Yang,et al.  Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing , 2018, Inf. Process. Lett..

[19]  Cheng-Chi Lee,et al.  An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP , 2017, Informatica.

[20]  Joseph K. Liu,et al.  Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model , 2007, IACR Cryptol. ePrint Arch..

[21]  Jean-Jacques Quisquater,et al.  On Constructing Certificateless Cryptosystems from Identity Based Encryption , 2006, Public Key Cryptography.

[22]  Qiaoyan Wen,et al.  Cryptanalysis and improvement of a certificateless encryption scheme in the standard model , 2013, Frontiers of Computer Science.

[23]  Lunzhi Deng,et al.  Certificateless Short Aggregate Signature Scheme for Mobile Devices , 2019, IEEE Access.

[24]  Hung-Yu Chien,et al.  Improved Anonymous Multi-receiver Identity-Based Encryption , 2012, Comput. J..

[25]  Chun-Ta Li,et al.  An efficient online/offline ID-based short signature procedure using extended chaotic maps , 2018, Soft Computing.

[26]  Joonsang Baek,et al.  Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , 2005, Public Key Cryptography.

[27]  Jian Weng,et al.  Anonymous identity-based broadcast encryption technology for smart city information system , 2017, Personal and Ubiquitous Computing.

[28]  Jianhong Zhang,et al.  An improved anonymous multi-receiver identity-based encryption scheme , 2015, Int. J. Commun. Syst..

[29]  Jian Shen,et al.  Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices , 2017, Soft Comput..

[30]  Lunzhi Deng,et al.  Efficient Certificateless Anonymous Multi-Receiver Encryption Scheme without Bilinear Parings , 2018, Mathematical Problems in Engineering.

[31]  KhanMuhammad Khurram,et al.  Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing , 2015 .

[32]  Muhammad Khurram Khan,et al.  Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing , 2015, Secur. Commun. Networks.

[33]  Peng Gong,et al.  New certificateless public key encryption scheme without pairing , 2013, IET Inf. Secur..

[34]  Fangguo Zhang,et al.  Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority , 2012, J. Syst. Softw..

[35]  Joonsang Baek,et al.  Strongly Secure Certificateless Public Key Encryption Without Pairing , 2007, CANS.

[36]  Mingwu Zhang,et al.  Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation , 2013, IEEE Systems Journal.

[37]  Jiguo Li,et al.  Identity-based broadcast encryption with continuous leakage resilience , 2018, Inf. Sci..

[38]  Xiangxue Li,et al.  New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group , 2018 .

[39]  Sanjit Chatterjee,et al.  Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext , 2006, INDOCRYPT.

[40]  Chanil Park,et al.  Privacy-preserving identity-based broadcast encryption , 2012, Inf. Fusion.

[41]  Qiong Huang,et al.  Generic Certificateless Encryption in the Standard Model , 2007, IWSEC.

[42]  Qiaoyan Wen,et al.  An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems , 2013, Journal of Medical Systems.

[43]  Cheng-Chi Lee,et al.  Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs , 2018, IET Networks.

[44]  Limin Shen,et al.  Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[45]  Seong Oun Hwang,et al.  An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks , 2013, IEICE Trans. Commun..

[46]  Seong Oun Hwang,et al.  An Efficient Anonymous Identity-Based Broadcast Encryption for Large-Scale Wireless Sensor Networks , 2012, Ad Hoc Sens. Wirel. Networks.

[47]  Yixian Yang,et al.  Certificateless short signature scheme from pairing in the standard model , 2018, Int. J. Commun. Syst..

[48]  Cheng-Chi Lee,et al.  An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment , 2019, Soft Comput..

[49]  Cheng-Chi Lee,et al.  An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem , 2018, Soft Comput..

[50]  Ying-Hao Hung,et al.  Efficient Anonymous Multireceiver Certificateless Encryption , 2017, IEEE Systems Journal.

[51]  Cheng-Chi Lee,et al.  A secure key authentication scheme for cryptosystems based on GDLP and IFP , 2017, Soft Comput..