Aitac: an identity-based traceable anonymous communication model

被引:0
作者
Fengyin Li
Zhongxing Liu
Yilei Wang
Nan Wu
Jiguo Yu
Chongzhi Gao
Huiyu Zhou
机构
[1] Qufu Normal University,School of Computer Science
[2] Qufu Normal University,Science and Technology Department
[3] Qilu University of Technology (Shandong Academy of Sciences),School of Computer Science and Technology
[4] National Supercomputer Center in Jinan,Shandong Computer Science Center
[5] Guangzhou University,Institute of Artificial Intelligence and Blockchain
[6] University of Leicester,School of Informatics
来源
Journal of Ambient Intelligence and Humanized Computing | 2022年 / 13卷
关键词
Identity-based encryption; Bilinear map; Privacy protection; Identifications; Anonymous communications;
D O I
暂无
中图分类号
学科分类号
摘要
In the big data background, data privacy becomes more and more important when data leakage and other security events occur more frequently. As one of the key means of privacy protection, anonymous communication attracts large attention. Aiming at the problems such as low efficiency of message forwarding, high communication delay and abusing of anonymity, this paper presents an identity-based traceable anonymous communication model by adding a preprocessing phase, modifying the ciphertext structure and increasing the controllability of anonymity. Firstly, a new identity-based signature algorithm is proposed, and its security is proved via existential unforgeability against chosen-message attacks (EU-CMA). The signature algorithm is further applied to the anonymous communication model to implement the controllability of revocable anonymity. Secondly, by adding a preprocessing Setup phase, the operations of identifications distribution and user authentication are launched before the anonymous communication phase starts, and this practice significantly improves the efficiency of the anonymous communication model. Finally, by adding the hash value of the message and the user identification as the message authentication code, we design a new ciphertext structure, which can efficiently guarantee the integrity of the ciphertext. Performance analysis and simulation results show that the proposed anonymous communication model has high message forwarding efficiency and better security and controllability of anonymity.
引用
收藏
页码:1353 / 1362
页数:9
相关论文
共 32 条
[1]  
Chaum D(1981)Untraceable electronic mail, return addresses, and digital pseudonyms Commun ACM 24 84-90
[2]  
Chaum D(1988)The dining cryptographers problem: unconditional sender and recipient intractability J Cryptol 1 65-75
[3]  
Dingledine R(2004)Tor: The second-generation onion router J Franklin Inst 239 135-139
[4]  
Mathewson N(1984)A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans Inf Theory 31 469-472
[5]  
Syverson P(2020)A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud J Ambient Intell Human Comput 2016 115-134
[6]  
Elgamal T(2018)Anonymous communication via anonymous identity-based encryption and its application in IoT Wirel Commun Mobile Comput 10 952-963
[7]  
Jayaraman I(2015)Riffle: an efficient communication system with strong anonymity Privacy Enhanc Technol 75 51-62
[8]  
Panneerselvam AS(2009)Distributed anonymous data perturbation method for privacy-preserving data mining J Zhejiang Univ Sci A 72 1-12
[9]  
Jiang L(2018)Distance metric optimization driven convolutional neural network for age invariant face recognition Pattern Recogn 196 47-53
[10]  
Li T(2018)Secure attribute-based data sharing for resource-limited users in cloud computing Comput Secur 1 188-1562