Aitac: an identity-based traceable anonymous communication model

被引:0
作者
Fengyin Li
Zhongxing Liu
Yilei Wang
Nan Wu
Jiguo Yu
Chongzhi Gao
Huiyu Zhou
机构
[1] Qufu Normal University,School of Computer Science
[2] Qufu Normal University,Science and Technology Department
[3] Qilu University of Technology (Shandong Academy of Sciences),School of Computer Science and Technology
[4] National Supercomputer Center in Jinan,Shandong Computer Science Center
[5] Guangzhou University,Institute of Artificial Intelligence and Blockchain
[6] University of Leicester,School of Informatics
来源
Journal of Ambient Intelligence and Humanized Computing | 2022年 / 13卷
关键词
Identity-based encryption; Bilinear map; Privacy protection; Identifications; Anonymous communications;
D O I
暂无
中图分类号
学科分类号
摘要
In the big data background, data privacy becomes more and more important when data leakage and other security events occur more frequently. As one of the key means of privacy protection, anonymous communication attracts large attention. Aiming at the problems such as low efficiency of message forwarding, high communication delay and abusing of anonymity, this paper presents an identity-based traceable anonymous communication model by adding a preprocessing phase, modifying the ciphertext structure and increasing the controllability of anonymity. Firstly, a new identity-based signature algorithm is proposed, and its security is proved via existential unforgeability against chosen-message attacks (EU-CMA). The signature algorithm is further applied to the anonymous communication model to implement the controllability of revocable anonymity. Secondly, by adding a preprocessing Setup phase, the operations of identifications distribution and user authentication are launched before the anonymous communication phase starts, and this practice significantly improves the efficiency of the anonymous communication model. Finally, by adding the hash value of the message and the user identification as the message authentication code, we design a new ciphertext structure, which can efficiently guarantee the integrity of the ciphertext. Performance analysis and simulation results show that the proposed anonymous communication model has high message forwarding efficiency and better security and controllability of anonymity.
引用
收藏
页码:1353 / 1362
页数:9
相关论文
共 32 条
[11]  
Li X(1985)Identity-based cryptosystems and signature schemes Lect Notes Comput 25 1548-undefined
[12]  
Kwon A(2020)Risk management and privacy violation detection in the PoSeID-on data privacy platform SN Comput Sci undefined undefined-undefined
[13]  
Lazar D(2020)Novel temporal perturbation-based privacy-preserving mechanism for smart meters Mobile Netw Appl undefined undefined-undefined
[14]  
Devadas S(2019)Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things Int J Distrib Sensor Netw undefined undefined-undefined
[15]  
Li F(undefined)undefined undefined undefined undefined-undefined
[16]  
Ma J(undefined)undefined undefined undefined undefined-undefined
[17]  
Li J(undefined)undefined undefined undefined undefined-undefined
[18]  
Li Y(undefined)undefined undefined undefined undefined-undefined
[19]  
Wang G(undefined)undefined undefined undefined undefined-undefined
[20]  
Nie L(undefined)undefined undefined undefined undefined-undefined