Abstract
To achieve heterogeneous communication from certificateless cryptography (CLC) to identity-based cryptography (IBC), we present a heterogeneous scheme that enables m senders in the CLC to transmit m message to n receivers in the IBC. In the proposed signcryption scheme, each sender is mapped to a distinct pseudo identity, so the sender’s identity privacy preservation can be guaranteed. At the same time, to ensure the receiver’s identity privacy, the identity information of all authorized recipients is mixed by the Lagrange interpolation polynomial during the signcryption process, which prevents the receiver’s identity from being exposed. Compared with existing schemes, the proposed scheme presents efficient computational overhead and is suitable for heterogeneous environments. In addition, our scheme has the indistinguishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen-message attacks in the random oracle model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). doi:10.1007/3-540-39568-7_5
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). doi:10.1007/978-3-540-40061-5_29
Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) \(\ll \) cost(signature) + cost(encryption). In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997). doi:10.1007/BFb0052234
Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259–274. Springer, Heidelberg (2000). doi:10.1007/3-540-45539-6_18
Duan, S., Cao, Z.: Efficient and provably secure multi-receiver identity-based signcryption. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 195–206. Springer, Heidelberg (2006). doi:10.1007/11780656_17
Pang, L., Li, H., Gao, L., Wang, Y.: Completely anonymous multi-recipient signcryption scheme with public verification. PLoS ONE 8(5), e63562 (2013)
Sun, Y., Li, H.: Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci. China Inf. Sci. 53(3), 557–566 (2010)
Huang, Q., Wong, D.S., Yang, G.: Heterogeneous signcryption with key privacy. Comput. J. 54(4), 525–536 (2011)
He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681–2691 (2015)
Kamat, P., Baliga, A., Trappe, W.: Secure, pseudonymous, and auditable communication in vehicular ad hoc networks. Secur. Commun. Netw. 1(3), 233–244 (2008)
Horng, S.J., Tzeng, S.F., Huang, P.H., Wang, X., Li, T., Khan, M.K.: An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Inf. Sci. 317(C), 48–66 (2015)
Zhang, Z., Susilo, W., Raad, R.: Mobile ad-hoc network key management with certificateless cryptography. In: ICSPCS, pp. 1–10. IEEE Xplore (2008)
Barbosa, M., Farshim, P.: Certificateless signcryption. In: ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 369–372 (2008)
Li, F., Zhang, H., Takagi, T.: Efficient signcryption for heterogeneous systems. IEEE Syst. J. 7(3), 420–429 (2013)
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)
Eslami, Z., Pakniat, N.: Certificateless aggregate signcryption. J. King Saud Univ. - Comput. Inf. Sci. 26, 276–286 (2014)
The Pairing-based Cryptography Library. http://crypto.stanford.edu/pbc/
Acknowledgments
The work was supported by the National Natural Science Foundation of China under grant 61562077, 61462077, 61662071, 61662069.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Niu, S., Li, Z., Wang, C. (2017). Privacy-Preserving Multi-party Aggregate Signcryption for Heterogeneous Systems. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-68542-7_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68541-0
Online ISBN: 978-3-319-68542-7
eBook Packages: Computer ScienceComputer Science (R0)