Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption

被引:6
作者
Tseng, Yi-Fan [1 ]
Fan, Chun-I [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
关键词
anonymity; multi-receiver encryption; chosen-ciphertext attacks; certificate less encryption; sender authentication; IDENTITY-BASED ENCRYPTION; SCHEME;
D O I
10.6688/JISE.201811_34(6).0009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-receiver encryption allows a sender to choose a set of authorized receivers and send them a message securely and efficiently. Only one ciphertext corresponding to the message is generated regardless of the number of receivers. Thus it is practical and useful for video conferencing systems, pay-per-view channels, distance education, and so forth. In 2010, for further protecting receivers' privacy, anonymous multi-receiver identity-based (ID-based) encryption was first discussed, and from then on, many works on the topic have been presented so far. To deal with the key escrow problem inherited from ID-based encryption (IBE), Islam et al. proposed the first anonymous multi-receiver certificateless encryption (AMRCLE) in 2014. In 2015, Hung et al. proposed a novel AMRCLE to improve the efficiency. However, we found that their security proofs are flawed, i.e., the simulation cannot be successfully performed. In this paper, we present a novel AMRCLE scheme with CCA security in confidentiality and anonymity against both Type I and Type II adversaries. Moreover, the identity of the sender of a ciphertext can be authenticated by the receiver after a successful decryption. To the best of our knowledge, the proposed scheme is the first CCA secure AMRCLE scheme, and furthermore, we also pioneer in achieving sender authentication in AMRCLE.
引用
收藏
页码:1517 / 1541
页数:25
相关论文
共 34 条
[1]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[2]  
Baek J, 2005, LECT NOTES COMPUT SC, V3386, P380
[3]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[4]  
Chen Z., 2014, INT J NETW SECUR, V16, P285
[5]  
Chen Z., 2012, INT J NETW SECUR, V14, P270
[6]   Improved Anonymous Multi-receiver Identity-Based Encryption [J].
Chien, Hung-Yu .
COMPUTER JOURNAL, 2012, 55 (04) :439-446
[7]   An ID-based broadcast encryption scheme for key distribution [J].
Du, XJ ;
Wang, Y ;
Ge, JH ;
Wang, YM .
IEEE TRANSACTIONS ON BROADCASTING, 2005, 51 (02) :264-266
[8]   Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security [J].
Fan, Chun-I ;
Tseng, Yi-Fan .
SYMMETRY-BASEL, 2015, 7 (04) :1856-1881
[9]   Anonymous Multireceiver Identity-Based Encryption [J].
Fan, Chun-I ;
Huang, Ling-Ying ;
Ho, Pei-Hsiu .
IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (09) :1239-1249
[10]  
Harn Lein, 2013, International Journal of Network Security, V15, P307