Certificateless deniably authenticated encryption and its application to e-voting system

被引:9
作者
Ahene, Emmanuel [1 ]
Jin, Chunhua [2 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Ctr Cyber Secur, Chengdu 611731, Sichuan, Peoples R China
[2] Huaiyin Inst Technol, Lab Internet Things & Mobile Internet Technol, Huaian 223003, Peoples R China
基金
中国国家自然科学基金;
关键词
Deniably authenticated encryption; Certificateless cryptography; e-voting system; Security; IDENTITY-BASED SIGNATURE; PROTOCOL; SCHEME;
D O I
10.1007/s11235-018-0496-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The concept of deniably authenticated encryption (DAE) is presently significant in cryptography due to its security properties and wide range of application. It achieves deniable authentication and confidentiality in a simultaneous manner. It has merited application in e-voting systems, e-mail systems and confidential online negotiation. Although several DAE schemes have been proposed recently, we point out that those constructions are either weak against masquerading attacks or inherent key escrow problem. As a remedy, we propose a certificateless deniably authenticated encryption (CLDAE) scheme that is provably secure. Typically, we can obtain this goal using the deniable authentication followed by certificateless encryption approach. However, this approach is computationally expensive and complex to design since it is a combination of two cryptographic constructions. In contrast, our CLDAE scheme is a single cryptographic construction but it concurrently accomplishes the requirements of public key encryption and deniable authentication at a relatively lower cost. For instance, our simulation results at 80 bits of security level shows up to be approximately 43.3 and 30.4% respectively faster than two deniable authentication followed by certificateless encryption schemes. Moreover, the communication overhead of our CLDAE scheme is 12.9 and 34.9% lesser than that of those two schemes respectively. Finally, to demonstrate the significance of our CLDAE scheme, we apply it to a real world application such as e-voting system.
引用
收藏
页码:417 / 434
页数:18
相关论文
共 38 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
[Anonymous], 2002, The Design of Rijndael
[3]  
[Anonymous], 2007, PBC LIB
[4]  
Aumann Y., 1998, P INT C THEOR COMP S
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]  
Cao TJ, 2005, 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, P388
[7]  
Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18
[8]  
Chou J, 2006, CRYPTOLOGY EPRINT AR, V335, P1
[9]   A novel certificateless deniable authentication protocol [J].
Jin, Chunhua ;
Xu, Chunxiang ;
Li, Fagen ;
Zhang, Xiaojun .
International Journal of Computers and Applications, 2015, 37 (3-4) :181-192
[10]   Deniable authentication protocols [J].
Deng, X ;
Lee, CH ;
Zhu, H .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2001, 148 (02) :101-104