Abstract
The normal public key encryption system has complicated certificate management and key escrow problems, while the certificateless encryption system does no longer require certificates, which reduces storage space and communication costs. As a result, the certificateless encryption system has acquired enormous attention from the academic community, but there are two types of attacks that stop it from being broadly used in manufacturing and life. Because of its tamper proof and autonomy, blockchain is helpful to resist these two kinds of attacks. Therefore, this paper proposes an encryption scheme combining blockchain technology and certificateless encryption technology. This scheme can not only make certificateless encryption scheme resist these two attacks, but also decrease the storage space of blockchain and resolve the complex certificate management problems. Related experimental consequences prove that our scheme can correctly resist the two types of attacks confronted by means of certificateless encryption systems and resolve the key escrow problem.
Similar content being viewed by others
References
Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Laih CS (ed) Advances in cryptology - asiacrypt 2003. Springer, Berlin, pp 452–473
Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y, Muralidharan S, Murthy C, Nguyen B, Sethi M, Singh G, Smith K, Sorniotti A, Stathakopoulou C, Vukolić M, Cocco SW, Yellick J (2018) Hyperledger fabric: A distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference. Association for Computing Machinery, New York, pp 30:1–30:15
Ao W, Fu S, Zhang C, Huang Y, Xia F (2019) A secure identity authentication scheme based on blockchain and identity-based cryptography. In: 2019 IEEE 2nd international conference on computer and communication engineering technology (CCET). IEEE, Beijing, pp 90–95
Ao W, Fu S, Zhang C, Xu M (2020) A secure certificateless identity authentication scheme based on blockchain. In: Han W, Zhu L, Yan F (eds) Trusted computing and information security. Springer, Singapore, pp 251–266
Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Kilian J (ed) Advances in cryptology — crypto 2001. Springer, Berlin, pp 213–229
Carrara GR, Burle LM, Medeiros DSV, de Albuquerque CVN, Mattos DMF (2020) Consistency, availability, and partition tolerance in blockchain: A survey on the consensus mechanism over peer-to-peer networking. Ann Telecommun 75(3-4, SI):163–174
Chen Y, Zhang F (2008) A new certificateless public key encryption scheme. Wuhan Univ J Nat Sci 13(6):721–726
Cheng L, Wen Q, Jin Z, Zhang H (2014) Cryptanalysis and improvement of a certificateless encryption scheme in the standard model. Front Comput Sci 8(1):163–173
Fujisaki E, Okamoto T (2013) Secure integration of asymmetric and symmetric encryption schemes. J Cryptol 26(1):80–101
Guo S, Hu X, Guo S, Qiu X, Qi F (2020) Blockchain meets edge computing: A distributed and trusted authentication system. IEEE Trans Indust Inform 16(3):1972–1983
Huang H, Zhu P, Xiao F, Sun X, Huang Q (2020) A blockchain-based scheme for privacy-preserving and secure sharing of medical data. Comput Secur 99:102010. https://doi.org/10.1016/j.cose.2020.102010
Kakei S, Shiraishi Y, Mohri M, Nakamura T, Hashimoto M, Saito S (2020) Cross-certification towards distributed authentication infrastructure: A case of hyperledger fabric. IEEE Access 8:135742–135757
Liu Y, Wang H, Wang C (2017) Efficient and secure certificateless proxy re-encryption. KSII Trans Int Inform Syst 11(4):2254–2275
Lu Y, Li J (2019) Constructing certificateless encryption with keyword search against outside and inside keyword guessing attacks. China Commun 16(7):156–173
Luo M, Wan Y (2018) An enhanced certificateless signcryption in the standard model. Wirel Pers Commun 98(3):2693–2709
Lynn B, Unger N (2018) Go package pbc. https://pkg.go.dev/github.com/Nik-U/pbc. Accessed 19 Oct 2020
Lynn B, Unger N (2020) Pbc library—the pairing-based cryptography library. https://crypto.stanford.edu/pbc/. Accessed Oct 19 2020
Ma G, Ge C, Zhou L (2020) Achieving reliable timestamp in the bitcoin platform. Peer-to-Peer Netw Appl. https://doi.org/10.1007/s12083-020-00905-6
Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial iot. IEEE J Select Areas Commun 38(5):942–954
Shi N, Tan L, Li W, Qi X, Yu K (2020) A blockchain-empowered aaa scheme in the large-scale hetnet. Digi Commun Netw https://doi.org/10.1016/j.dcan.2020.10.002
Turek J, Shasha D (1992) The many faces of consensus in distributed systems. Computer 25 (6):8–17
Wang L, Chen K, Mao X (2014) Wang, y.: efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing. J Shanghai Jiaotong Univ (Science) 19(4):398–405
Yan X, Gong P, Bai Z, Wang J, Li P (2013) New certificateless public key encryption scheme without pairing. IET Inf Secur 7(4):271–276
Yang L, Li J, Zhang Y (2020) Privacy-preserving and pairing-free multirecipient certificateless encryption with keyword search for cloud-assisted iiot. IEEE Int Things J 7(4):2553–2562
Yinxia S, Futai Z (2010) Secure certificate less encryption with short ciphertext. Chin J Electron 19(2):313–318
YinXia S, Hui L (2010) Short-ciphertext and bdh-based cca2 secure certificateless encryption. Sci China Inform Sci 53(10):2005–2015
Yu K, Tan L, Shang X, Huang J, Srivastava G, Chatterjee P (2020) Efficient and privacy-preserving medical research support platform against covid-19: A blockchain-based approach. IEEE Consumer Electronics Magazine. https://doi.org/10.1109/MCE.2020.3035520
Zhang G (2011) Secret key-awareness secure in certificateless cryptography. Procedia Environmental Sciences 10:633–639
Zhen H, Ji-Qiang L, Da-Wei Z, Liang C (2016) Id authentication scheme based on ptpm and certificateless public key cryptography in cloud environment. J Softw 27(06):1523–1537
Zheng X, Zhou Y, Ye Y, Li F (2020) A cloud data deduplication scheme based on certificateless proxy re-encryption. J Syst Archit 102:101666. https://doi.org/10.1016/j.sysarc.2019.101666
Zhou B, Li H, Xu L (2018) An authentication scheme using identity-based encryption blockchain. In: 2018 IEEE Symposium on computers and communications (ISCC). IEEE, Brazil, pp 556–561
Acknowledgements
This work was supported by the National Natural Science Foundation of China (Grant No. 61772099); the Science and Technology Innovation Leadership Support Program of Chongqing (Grant No. CSTCCXLJRC201917);Chongqing University of Posts and Telecommunications Doctoral Candidate Talent Training Project (Grant No. BYJS202005); the University Outstanding Achievements Transformation Funding Project of Chongqing (Grant No. KJZH17116); the Innovation and Entrepreneurship Demonstration Team Cultivation Plan of Chongqing (Grant No. CSTC2017kjrc-cxcytd0063); the Technology Innovation and Application Development Project of Chongqing (CSTC2019jscx-fxydX0086).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interests
The authors have no relevant financial or non-financial interests to disclose.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article belongs to the Topical Collection: Special Issue on Blockchain for Peer-to-Peer Computing Guest Editors: Keping Yu, Chunming Rong, Yang Cao, and Wenjuan Li
Rights and permissions
About this article
Cite this article
Xu, G., Dong, J. & Ma, C. A certificateless encryption scheme based on blockchain. Peer-to-Peer Netw. Appl. 14, 2952–2960 (2021). https://doi.org/10.1007/s12083-021-01147-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-021-01147-w