Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems

In recent years, secure communication and privacy-preserving are gaining popularity because of the advent of wireless network. Certificateless cryptography CLC and identity-based cryptography IBC have already been widely applied in the area of wireless network. Hence, to achieve secure communication from CLC to IBC, we present a heterogeneous signcryption scheme that enables a sender in the CLC to transmit a message to multi-receiver in the IBC. Our scheme has no restrictions on the system parameters and master keys; private key generator and key generating center generate their own system parameters and master key for the IBC users and the CLC user, separately. Considering privacy-preserving in heterogeneous communication, we show that our scheme can realize the anonymity of all receivers. Compared with other schemes, our scheme has more advantages, such as public verification and decryption fairness, which are attractive for wireless network applications. Moreover, our scheme has the indistinguishability against adaptive chosen ciphertext attacks, the existential unforgeability against adaptive chosen messages attacks, and anonymous indistinguishability of encryptions under selective-ID, chosen ciphertext attack in the random oracle model. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Aggeliki Sgora,et al.  A survey on security and privacy issues in Wireless Mesh Networks , 2016, Secur. Commun. Networks.

[2]  Yuxiang Wang,et al.  Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks , 2014, Wirel. Pers. Commun..

[3]  Bo Zhang,et al.  An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model , 2010, AST/UCMA/ISA/ACN.

[4]  Jean-Luc Danger,et al.  Sophisticated security verification on routing repaired balanced cell-based dual-rail logic against side channel analysis , 2015, IET Inf. Secur..

[5]  Silvio Micali,et al.  Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements , 2000, EUROCRYPT.

[6]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[7]  Zhenfei Zhang,et al.  Mobile ad-hoc network key management with certificateless cryptography , 2008, 2008 2nd International Conference on Signal Processing and Communication Systems.

[8]  Mingwu Zhang,et al.  Efficient Identity-Based Signcryption Scheme for Multiple Receivers , 2007, ATC.

[9]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[10]  Guomin Yang,et al.  Heterogeneous Signcryption with Key Privacy , 2011, Comput. J..

[11]  Jin Wang,et al.  A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks , 2014 .

[12]  Hui Li,et al.  Efficient signcryption between TPKC and IDPKC and its multi-receiver construction , 2010, Science China Information Sciences.

[13]  Fagen Li,et al.  A new multi-receiver ID-based signcryption scheme for group communications , 2009, 2009 International Conference on Communications, Circuits and Systems.

[14]  Chun-I Fan,et al.  Anonymous Multireceiver Identity-Based Encryption , 2010, IEEE Transactions on Computers.

[15]  C. Pandu Rangan,et al.  An Efficient Identity-Based Signcryption Scheme for Multiple Receivers , 2009, IWSEC.

[16]  Lei Zhang,et al.  Cryptanalysis of a Certificateless Multi-receiver Signcryption Scheme , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[17]  Baowen Xu,et al.  An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Information Forensics and Security.

[18]  Xian Wang,et al.  An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks , 2015, Inf. Sci..

[19]  Lu Gao,et al.  Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification , 2013, PloS one.

[20]  Sunder Lal,et al.  Anonymous ID Based Signcryption Scheme for Multiple Receivers , 2009, IACR Cryptol. ePrint Arch..

[21]  Jian Shen,et al.  A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .

[22]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[23]  Arati Baliga,et al.  Secure, pseudonymous, and auditable communication in vehicular ad hoc networks , 2008, Secur. Commun. Networks.

[24]  Zhenfu Cao,et al.  Efficient and Provably Secure Multi-receiver Identity-Based Signcryption , 2006, ACISP.

[25]  Hui Zhang,et al.  Efficient Signcryption for Heterogeneous Systems , 2013, IEEE Systems Journal.

[26]  Jianhong Zhang,et al.  Efficient Provable Secure ID-Based Anonymous Signcryption Scheme , 2009, 2009 Pacific-Asia Conference on Circuits, Communications and Systems.