An Anonymous Multireceiver with Online/Offline Identity-Based Encryption

Anonymous multireceiver encryption scheme can not only protect the privacy of the receiver but also ensure the security of message. However, the computational cost of this scheme is very large. It is not suitable for the sender which has limited resources, such as mobile devices and sensor nodes. In this work, an anonymous multireceiver online/offline identity-based encryption is proposed based on offline/online and identity-based encryption (IBE). In identity-based encryption scheme, the sender can encrypt the message using the unique information of the user (such as identity number or e-mail address) as its public key. The receiver obtains the private key from a central authority. For mobile device with limited resource, the online/offline encryption scheme can reduce the computational cost. Compared to the previous anonymous multireceiver schemes, the proposed scheme can efficiently encrypt message with offline/online method and ensure the anonymity of receivers. The analysis results also show that our scheme is efficient in terms of computational cost by comparing to the previous works.

[1]  Joonsang Baek,et al.  Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.

[2]  Mohammad Shojafar,et al.  FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids , 2014, Int. J. Grid Util. Comput..

[3]  Mihir Bellare,et al.  Randomness Re-use in Multi-recipient Encryption Schemeas , 2003, Public Key Cryptography.

[4]  Fuchun Guo,et al.  Improved Identity-Based Online/Offline Encryption , 2015, ACISP.

[5]  Ivan Stojmenovic,et al.  Distributed Fine-Grained Access Control in Wireless Sensor Networks , 2011, 2011 IEEE International Parallel & Distributed Processing Symposium.

[6]  Chun-I Fan,et al.  Anonymous Multireceiver Identity-Based Encryption , 2010, IEEE Transactions on Computers.

[7]  Joonsang Baek,et al.  Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , 2005, Public Key Cryptography.

[8]  Hung-Yu Chien,et al.  Improved Anonymous Multi-receiver Identity-Based Encryption , 2012, Comput. J..

[9]  Yasuyuki Nogami,et al.  Pairing-based cryptography for homomorphic cryptography , 2014, 2014 International Symposium on Information Theory and its Applications.

[10]  Jianhong Zhang,et al.  Comment on Anonymous Multi-receiver Identity-Based Encryption Scheme , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[11]  Jian Shen,et al.  Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices , 2017, Soft Comput..

[12]  Mauro Conti,et al.  RARE: Defeating side channels based on data-deduplication in cloud storage , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[13]  Fuchun Guo,et al.  Identity-Based Online/Offline Encryption , 2008, Financial Cryptography.

[14]  Robert H. Deng,et al.  Practical ID-based encryption for wireless sensor network , 2010, ASIACCS '10.

[15]  Brent Waters,et al.  Online/Offline Attribute-Based Encryption , 2014, IACR Cryptol. ePrint Arch..

[16]  Lei Hu,et al.  Pairing-Based Multi-Recipient Public Key Encryption , 2006, Security and Management.

[17]  Zhiwei Wang,et al.  Attribute-Based Online/Offline Encryption in Smart Grid , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).

[18]  Yi Mu,et al.  Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys , 2016, Comput. J..

[19]  Chunhua Jin,et al.  Certificateless online/offline signcryption for the Internet of Things , 2015, Wireless Networks.

[20]  Liaojun Pang,et al.  Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme , 2014, IET Inf. Secur..

[21]  Huaqun Wang,et al.  Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme , 2012, IET Inf. Secur..

[22]  Craig Gentry,et al.  Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.

[23]  Dalit Naor Broadcast Encryption , 1993, Encyclopedia of Cryptography and Security.