Lightweight and Secure Certificateless Multi-receiver Encryption based on ECC

In this paper, we propose an elliptic curve cryptography (ECC)-based certificateless multi-receiver encryption scheme for device to device communications on Internet of Things (IoT) applications. The proposed scheme eliminates computation expensive pairing operations to provide a lightweight multi-receiver encryption scheme, which has favourable properties for IoT applications. In addition to less time usage for both sender and receiver, the proposed scheme offers the necessary security properties such as source authentication, implicit user authentication, message integrity, and replay attack prevention for secure data exchange. In this paper, we show security proof for the proposed scheme based on the Elliptic Curve Discrete Logarithm Problem (ECDLP). We implemented our proposed scheme on a real embedded Android device and confirmed that it achieves less time cost for both encryption and decryption compared with the existing most efficient certificate-based multi-receiver encryption scheme and certificateless multi-receiver encryption scheme.

[1]  Yang Ming,et al.  Multi-receiver Identity-Based Key Encapsulation in the Standard Model , 2010, 2010 International Conference of Information Science and Management Engineering.

[2]  Joonsang Baek,et al.  Certificateless Public Key Encryption Without Pairing , 2005, ISC.

[3]  C. Pandu Rangan,et al.  Efficient and Provably Secure Certificateless Multi-receiver Signcryption , 2008, ProvSec.

[4]  Chun-I Fan,et al.  Anonymous Multireceiver Identity-Based Encryption , 2010, IEEE Transactions on Computers.

[5]  Young-Ran Lee,et al.  An Authenticated Certificateless Public Key Encryption Scheme , 2004, IACR Cryptol. ePrint Arch..

[6]  Peter Gutmann,et al.  PKI: It's Not Dead, Just Resting , 2002, Computer.

[7]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[8]  Joonsang Baek,et al.  Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , 2005, Public Key Cryptography.

[9]  Jianhong Zhang,et al.  An improved anonymous multi-receiver identity-based encryption scheme , 2015, Int. J. Commun. Syst..

[10]  Xiaolei Dong,et al.  Multi-Receiver Identity-Based Encryption in Multiple PKG Environment , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[11]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[12]  Shinji Shimojo,et al.  A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication , 2017, 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC).

[13]  Dong Hoon Lee,et al.  Efficient Certificateless Signature Schemes , 2007, ACNS.

[14]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[15]  Xiaochun Cheng,et al.  Efficient Identity-based Broadcast Encryption without Random Oracles , 2010, J. Comput..

[16]  Nicky Mouha,et al.  Report on Lightweight Cryptography , 2017 .

[17]  Ling Xie,et al.  A New Efficient Certificateless Multi-Receiver Public Key Encryption Scheme , 2016 .

[18]  Jun Furukawa,et al.  Identity-Based Broadcast Encryption , 2007, IACR Cryptol. ePrint Arch..

[19]  C. Pandu Rangan,et al.  A note on the Certificateless Multi-receiver Signcryption Scheme , 2009, IACR Cryptol. ePrint Arch..

[20]  Jakob Nielsen,et al.  Usability engineering , 1997, The Computer Science and Engineering Handbook.

[21]  Shengbao Wang,et al.  Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications , 2007, IACR Cryptol. ePrint Arch..

[22]  Joonsang Baek,et al.  Strongly Secure Certificateless Public Key Encryption Without Pairing , 2007, CANS.

[23]  Chun-I Fan,et al.  Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security , 2015, Symmetry.

[24]  C. Pandu Rangan,et al.  An Efficient Identity-Based Signcryption Scheme for Multiple Receivers , 2009, IWSEC.

[25]  Masahiro Yoshida,et al.  Multi-access Edge Computing: A Survey , 2018, J. Inf. Process..

[26]  Han Jiang,et al.  An Efficient Dynamic Identity-based Broadcast Encryption Scheme , 2010, 2010 Second International Symposium on Data, Privacy, and E-Commerce.

[27]  Chul Sur,et al.  Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption , 2007, 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security (BLISS 2007).

[28]  Cécile Delerablée,et al.  Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.

[29]  Angelo De Caro,et al.  jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[30]  John A. Hoxmeier,et al.  System Response Time and User Satisfaction: An Experimental Study of Browser-based Applications , 2000 .