Skip to main content
Log in

A certificateless encryption scheme based on blockchain

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The normal public key encryption system has complicated certificate management and key escrow problems, while the certificateless encryption system does no longer require certificates, which reduces storage space and communication costs. As a result, the certificateless encryption system has acquired enormous attention from the academic community, but there are two types of attacks that stop it from being broadly used in manufacturing and life. Because of its tamper proof and autonomy, blockchain is helpful to resist these two kinds of attacks. Therefore, this paper proposes an encryption scheme combining blockchain technology and certificateless encryption technology. This scheme can not only make certificateless encryption scheme resist these two attacks, but also decrease the storage space of blockchain and resolve the complex certificate management problems. Related experimental consequences prove that our scheme can correctly resist the two types of attacks confronted by means of certificateless encryption systems and resolve the key escrow problem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Laih CS (ed) Advances in cryptology - asiacrypt 2003. Springer, Berlin, pp 452–473

  2. Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y, Muralidharan S, Murthy C, Nguyen B, Sethi M, Singh G, Smith K, Sorniotti A, Stathakopoulou C, Vukolić M, Cocco SW, Yellick J (2018) Hyperledger fabric: A distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference. Association for Computing Machinery, New York, pp 30:1–30:15

  3. Ao W, Fu S, Zhang C, Huang Y, Xia F (2019) A secure identity authentication scheme based on blockchain and identity-based cryptography. In: 2019 IEEE 2nd international conference on computer and communication engineering technology (CCET). IEEE, Beijing, pp 90–95

  4. Ao W, Fu S, Zhang C, Xu M (2020) A secure certificateless identity authentication scheme based on blockchain. In: Han W, Zhu L, Yan F (eds) Trusted computing and information security. Springer, Singapore, pp 251–266

  5. Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Kilian J (ed) Advances in cryptology — crypto 2001. Springer, Berlin, pp 213–229

  6. Carrara GR, Burle LM, Medeiros DSV, de Albuquerque CVN, Mattos DMF (2020) Consistency, availability, and partition tolerance in blockchain: A survey on the consensus mechanism over peer-to-peer networking. Ann Telecommun 75(3-4, SI):163–174

    Article  Google Scholar 

  7. Chen Y, Zhang F (2008) A new certificateless public key encryption scheme. Wuhan Univ J Nat Sci 13(6):721–726

    Article  MathSciNet  Google Scholar 

  8. Cheng L, Wen Q, Jin Z, Zhang H (2014) Cryptanalysis and improvement of a certificateless encryption scheme in the standard model. Front Comput Sci 8(1):163–173

    Article  MathSciNet  Google Scholar 

  9. Fujisaki E, Okamoto T (2013) Secure integration of asymmetric and symmetric encryption schemes. J Cryptol 26(1):80–101

    Article  MathSciNet  Google Scholar 

  10. Guo S, Hu X, Guo S, Qiu X, Qi F (2020) Blockchain meets edge computing: A distributed and trusted authentication system. IEEE Trans Indust Inform 16(3):1972–1983

    Article  Google Scholar 

  11. Huang H, Zhu P, Xiao F, Sun X, Huang Q (2020) A blockchain-based scheme for privacy-preserving and secure sharing of medical data. Comput Secur 99:102010. https://doi.org/10.1016/j.cose.2020.102010

    Article  Google Scholar 

  12. Kakei S, Shiraishi Y, Mohri M, Nakamura T, Hashimoto M, Saito S (2020) Cross-certification towards distributed authentication infrastructure: A case of hyperledger fabric. IEEE Access 8:135742–135757

    Article  Google Scholar 

  13. Liu Y, Wang H, Wang C (2017) Efficient and secure certificateless proxy re-encryption. KSII Trans Int Inform Syst 11(4):2254–2275

    Google Scholar 

  14. Lu Y, Li J (2019) Constructing certificateless encryption with keyword search against outside and inside keyword guessing attacks. China Commun 16(7):156–173

    Article  Google Scholar 

  15. Luo M, Wan Y (2018) An enhanced certificateless signcryption in the standard model. Wirel Pers Commun 98(3):2693–2709

    Article  Google Scholar 

  16. Lynn B, Unger N (2018) Go package pbc. https://pkg.go.dev/github.com/Nik-U/pbc. Accessed 19 Oct 2020

  17. Lynn B, Unger N (2020) Pbc library—the pairing-based cryptography library. https://crypto.stanford.edu/pbc/. Accessed Oct 19 2020

  18. Ma G, Ge C, Zhou L (2020) Achieving reliable timestamp in the bitcoin platform. Peer-to-Peer Netw Appl. https://doi.org/10.1007/s12083-020-00905-6

  19. Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial iot. IEEE J Select Areas Commun 38(5):942–954

    Article  Google Scholar 

  20. Shi N, Tan L, Li W, Qi X, Yu K (2020) A blockchain-empowered aaa scheme in the large-scale hetnet. Digi Commun Netw https://doi.org/10.1016/j.dcan.2020.10.002

  21. Turek J, Shasha D (1992) The many faces of consensus in distributed systems. Computer 25 (6):8–17

    Article  Google Scholar 

  22. Wang L, Chen K, Mao X (2014) Wang, y.: efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing. J Shanghai Jiaotong Univ (Science) 19(4):398–405

    Article  Google Scholar 

  23. Yan X, Gong P, Bai Z, Wang J, Li P (2013) New certificateless public key encryption scheme without pairing. IET Inf Secur 7(4):271–276

    Article  Google Scholar 

  24. Yang L, Li J, Zhang Y (2020) Privacy-preserving and pairing-free multirecipient certificateless encryption with keyword search for cloud-assisted iiot. IEEE Int Things J 7(4):2553–2562

    Article  Google Scholar 

  25. Yinxia S, Futai Z (2010) Secure certificate less encryption with short ciphertext. Chin J Electron 19(2):313–318

    Google Scholar 

  26. YinXia S, Hui L (2010) Short-ciphertext and bdh-based cca2 secure certificateless encryption. Sci China Inform Sci 53(10):2005–2015

    Article  MathSciNet  Google Scholar 

  27. Yu K, Tan L, Shang X, Huang J, Srivastava G, Chatterjee P (2020) Efficient and privacy-preserving medical research support platform against covid-19: A blockchain-based approach. IEEE Consumer Electronics Magazine. https://doi.org/10.1109/MCE.2020.3035520

  28. Zhang G (2011) Secret key-awareness secure in certificateless cryptography. Procedia Environmental Sciences 10:633–639

    Article  Google Scholar 

  29. Zhen H, Ji-Qiang L, Da-Wei Z, Liang C (2016) Id authentication scheme based on ptpm and certificateless public key cryptography in cloud environment. J Softw 27(06):1523–1537

    MathSciNet  Google Scholar 

  30. Zheng X, Zhou Y, Ye Y, Li F (2020) A cloud data deduplication scheme based on certificateless proxy re-encryption. J Syst Archit 102:101666. https://doi.org/10.1016/j.sysarc.2019.101666

    Article  Google Scholar 

  31. Zhou B, Li H, Xu L (2018) An authentication scheme using identity-based encryption blockchain. In: 2018 IEEE Symposium on computers and communications (ISCC). IEEE, Brazil, pp 556–561

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant No. 61772099); the Science and Technology Innovation Leadership Support Program of Chongqing (Grant No. CSTCCXLJRC201917);Chongqing University of Posts and Telecommunications Doctoral Candidate Talent Training Project (Grant No. BYJS202005); the University Outstanding Achievements Transformation Funding Project of Chongqing (Grant No. KJZH17116); the Innovation and Entrepreneurship Demonstration Team Cultivation Plan of Chongqing (Grant No. CSTC2017kjrc-cxcytd0063); the Technology Innovation and Application Development Project of Chongqing (CSTC2019jscx-fxydX0086).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jingnan Dong.

Ethics declarations

Conflict of Interests

The authors have no relevant financial or non-financial interests to disclose.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article belongs to the Topical Collection: Special Issue on Blockchain for Peer-to-Peer Computing Guest Editors: Keping Yu, Chunming Rong, Yang Cao, and Wenjuan Li

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, G., Dong, J. & Ma, C. A certificateless encryption scheme based on blockchain. Peer-to-Peer Netw. Appl. 14, 2952–2960 (2021). https://doi.org/10.1007/s12083-021-01147-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01147-w

Keywords

Navigation