Abstract
With the demand of providing message authentication and confidentiality as well as receiver anonymity in applications such as multicast communication, digital content distribution systems, and pay-per-view channels, many anonymous multi-receiver signcryption mechanisms have been put forward to offer these functions efficiently, which have the lower computational cost and communication overhead compared with the signature-then-encryption approaches. However, most certificateless-based schemes either focus on providing receiver anonymity or focus on improving signcryption efficiency. In addition, most certificateless-based schemes rely on bilinear pairing operations, which are more time consuming than modular exponentiation and scalar multiplication in finite fields. In this paper, we propose a practical anonymous multi-receiver certificateless signcryption (AMCLS) scheme that can satisfy message confidentiality, source authentication, and anonymity simultaneously and efficiently. In the proposed scheme, the sender’s signcryption cost increases linearly with the increase of the designated receivers, while the unsigncryption cost per receiver is constant. The adoption of elliptic curve scalar multiplication instead of bilinear pairing operation improves the efficiency of the proposed scheme. Both the sender and receivers’ identities are encrypted from being exposed to offer anonymity. Through security analysis, our proposal can be proved to achieve chosen-ciphertext attack (CCA) security in encryption indistinguishability and receiver anonymity in strong, commonly accepted attack models. Theoretical analyses and experimental results demonstrate that our scheme enjoys a better efficiency than other certificateless-based schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) \(<<\) cost (signature) + cost (encryption). In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052234
Malone-Lee, J.: Identity-based signcryption. Cryptology ePrint Archive, Report 2002/098 (2002)
Boyen, X.: Multipurpose identity-based signcryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383–399. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45146-4_23
Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362–379. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30580-4_25
Yu, Y., Yang, B., Huang, X., Zhang, M.: Efficient identity-based signcryption scheme for multiple receivers. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 13–21. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73547-2_4
Sharmila Deva Selvi, S., Sree Vivek, S., Shukla, D., Pandu Rangan, C.: Efficient and provably secure certificateless multi-receiver signcryption. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 52–67. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-88733-1_4
Sharmila Deva Selvi, S., Sree Vivek, S., Srinivasan, R., Pandu Rangan, C.: An efficient identity-based signcryption scheme for multiple receivers. In: Takagi, T., Mambo, M. (eds.) IWSEC 2009. LNCS, vol. 5824, pp. 71–88. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04846-3_6
Elkamchouchi, H., Abouelseoud, Y.: An efficient provably secure multi-recipient identity-based signcryption scheme. In: 2009 International Conference on Networking and Media Convergence, pp. 70–75. IEEE, Cairo, Egypt (2009)
Lal, S., Kushwah, P.: Anonymous ID based signcryption scheme for multiple receivers. IACR Cryptology ePrint Archive 345 (2009)
Fan, C.I., Huang, L.Y., Ho, P.H.: Anonymous multireciever identity-based encryption. IEEE Trans. Comput. 59, 1239–1249 (2010)
Wang, H., Zhang, Y., Xiong, H., Qin, B.: Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Inf. Secur. 6(1), 20–27 (2012)
Chien, H.-Y.: Improved anonymous multi-receiver identity-based encryption. Comput. J. 55(4), 439–446 (2012)
Zhang, J., Xu, Y.: Comment on anonymous multi-receiver identity-based encryption scheme. In: Proceedings of International Conference on Intelligent Networking and Collaborative Systems, Bucharest, Romania, pp. 473–476, September 2012
Li, H., Pang, L.: Cryptanalysis of Wang et al.’s improved anonymous multi-receiver identity-based encryption scheme. IET Inf. Secur. 8(1), 8–11 (2014)
Pang, L., Gao, L., Li, H., Wang, Y.: Anonymous multi-receiver ID-based signcryption scheme. IET Inf. Secur. 9(3), 194–201 (2015)
Tseng, Y.-M., Huang, Y.-H., Chang, H.-J.: Privacy-preserving multireceiver ID-based encryption with provable security. Int. J. Commun Syst 27(7), 1034–1050 (2014)
Fan, C.I., Tseng, Y.F.: Anonymous multi-receiver identity-based authenticated encryption with CCA security. Symmetry 7(4), 1856–1881 (2015)
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29
Barbosa, M., Farshim, P.: Certificateless signcryption. In: Abe, M., Gligor, V. (eds.) Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pp. 369–372. ACM, New York (2008)
Aranha, D., Castro, R., Lopez, J., et al.: Efficient certificateless signcryption. http://sbseg2008.inf.ufrgs.br/proceedings/data/pdf/st0301resumo.pdf
Wu, C., Chen, Z.: A new efficient certificateless signcryption scheme. In: Proceedings of IEEE International Symposium on Information Science and Engineering, Shanghai, China, pp. 661–664 (2008)
Xie, W., Zhang, Z.: Efficient and provably secure certificateless signcryption from bilinear maps. Cryptology ePrint Archive, Report 2009/578 (2009)
Sharmila Deva Selvi, S., Sree Vivek, S., Pandu Rangan, C.: Security weaknesses in two certificateless signcryption schemes. Cryptology ePrint Archive, Report 2010/92 (2010)
Barreto, P., Deusajute, A.M., Cruz, E.D.S., et al.: Toward efficient certificateless signcryption from (and without) bilinear pairings. http://sbseg2008.inf.ufrgs.br/anais/data/pdf/st0303artigo.pdf
Liu, Z., Hu, Y., Zhang, X., Ma, H.: Certificateless signcryption scheme in the standard model. Inf. Sci. 180(3), 452–464 (2010)
Miao, S., Zhang, F., Li, S., Mu, Y.: On security of a certificateless signcryption scheme. Inf. Sci. 232, 475–481 (2013)
Islam, S.K., Khan, M.K., Al-Khouri, A.M.: Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur. Commun. Netw. https://doi.org/10.1002/sec.1165.
Hung, Y.H., Huang, S.S., Tseng, Y.M., Tsai, T.T.: Efficient anonymous multireceiver certificateless encryption. IEEE Syst. J. 99, 1–12 (2015)
Tseng, Y.F., Fan, C.I.: Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption
Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73 (1993)
He, D., Wang, H., Wang, L., et al.: Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices. Soft. Comput. 21, 6801–6810 (2016)
Ronghai, G., Jiwen, Z., Lunzhi, D.: Efficient certificateless anonymous multi-receiver encryption scheme without bilinear parings. Math. Prob. Eng. 2018, 1–13 (2018)
OpenSSL Homepage. https://www.openssl.org/
PBC Library. https://crypto.stanford.edu/pbc/download.html/
Acknowledgment
This work was supported by National Natural Science Foundation of China (Grant No. 61602475), National Cryptographic Foundation of China (Grant No. MMJJ20170212), the National S & T Major Project of China (No. 2018ZX09201011), National Natural Science Foundation of China (No. 61802395).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Fu, M., Gu, X., Dai, W., Lin, J., Wang, H. (2020). Secure Multi-receiver Communications: Models, Proofs, and Implementation. In: Wen, S., Zomaya, A., Yang, L. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2019. Lecture Notes in Computer Science(), vol 11944. Springer, Cham. https://doi.org/10.1007/978-3-030-38991-8_45
Download citation
DOI: https://doi.org/10.1007/978-3-030-38991-8_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38990-1
Online ISBN: 978-3-030-38991-8
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)