Multi-message multi-receiver signcryption scheme based on blockchain

Author:

Yang Xiao Dong1,Wang Wen Jia1,Shu Bin2,Li Mei Juan1,Liu Rui Xia1,Wang Cai Fen3

Affiliation:

1. College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China

2. China Telecom WanWei Information Technology Co., LTD, Lanzhou 730030, China

3. Department of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, China

Abstract

<abstract><p>In conventional message communication systems, the practice of multi-message multi-receiver signcryption communication encounters several challenges, including the vulnerability to Key Generation Center (KGC) attacks, privacy breaches and excessive communication data volume. The KGC necessitates a secure channel to transmit partial private keys, thereby rendering the security of these partial private keys reliant on the integrity of the interaction channel. This dependence introduces concerns regarding the confidentiality of the private keys. Our proposal advocates for the substitution of the KGC in traditional certificateless schemes with blockchain and smart contract technology. Parameters are publicly disclosed on the blockchain, leveraging its tamper-proof property to ensure security. Furthermore, this scheme introduces conventional encryption techniques to achieve user identity privacy in the absence of a secure channel, effectively resolving the issue of user identity disclosure inherent in blockchain-based schemes and enhancing communication privacy. Moreover, users utilize smart contract algorithms to generate a portion of the encrypted private key, thereby minimizing the possibility of third-party attacks. In this paper, the scheme exhibits resilience against various attacks, including KGC leakage attacks, internal privilege attacks, replay attacks, distributed denial of service attacks and Man-in-the-Middle (MITM) attacks. Additionally, it possesses desirable security attributes such as key escrow security and non-repudiation. The proposed scheme has been theoretically and experimentally analyzed under the random oracle model, based on the computational Diffie-Hellman problem and the discrete logarithm problem. It has been proven to possess confidentiality and unforgeability. Compared with similar schemes, our scheme has lower computational cost and shorter ciphertext length. It has obvious advantages in communication and time overhead.</p></abstract>

Publisher

American Institute of Mathematical Sciences (AIMS)

Subject

Applied Mathematics,Computational Mathematics,General Agricultural and Biological Sciences,Modeling and Simulation,General Medicine

Reference38 articles.

1. S. S. Basu, S. Tripathy, Secure multicast communication techniques for IoT, in Security and Fault Tolerance in Internet of Things, Springer Cham, (2019), 43–59. https://doi.org/10.1007/978-3-030-02807-7_3

2. X. Boyen, Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography, in Annual International Cryptology Conference, Berlin, Heidelberg, Springer, (2003), 383–399. https://doi.org/10.1007/978-3-540-45146-4_23

3. L. Pang, H. Li, Q. Pei, Improved multicast key management of Chinese wireless local area network security standard, IET Commun., 6 (2012), 1126–1130. https://doi.org/10.1049/iet-com.2010.0954

4. H. Kashgarani, C. Miller, S. Suresh, A. Zacharias, Exploring Performance of GeoCAT data analysis routines on GPUs, Supercomputing, (2022).

5. H. Kashgarani, L. Kotthoff, Is algorithm selection worth it? Comparing selecting single algorithms and parallel execution, in AAAI Workshop on Meta-Learning and MetaDL Challenge, PMLR, 140 (2021), 58–64.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3