Skip to main content

One-Time Anonymous Certificateless Signcryption Scheme Based on Blockchain

  • Conference paper
  • First Online:
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2022)

Abstract

The rapid increase of users in the blockchain makes it possible to exchange a large amount of data every moment. Since the information published on blockchain is recorded and cannot be tampered with, there is the problem of leaking the real identity of users under the big data clustering attack. Meanwhile, the existing key generation center (KGC) needs a secure channel to transmit partial private keys, which makes partial private keys depending on the channel of interaction and creates a private key security problem. In this paper, we propose a one-time anonymous certificateless signcryption (OTACLSC) scheme based on blockchain. We securely use the public channel to improve the security of the private key. By constructing a one-time pseudonym public key in the blockchain to achieve anti-identity leakage, the communication initiator constructs the pseudonym public key of both communication parties to avoid the reuse of the pseudonym public key. Then we prove the security of the scheme under the random oracle model and compare it with other schemes. Our scheme has less computation cost and shorter ciphertext length while maintaining more reliable security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29

    Chapter  Google Scholar 

  2. An, J.H., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 83–107. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-46035-7_6

    Chapter  Google Scholar 

  3. Ao, W., Fu, S., Zhang, C., Huang, Y., Xia, F.: A secure identity authentication scheme based on blockchain and identity-based cryptography. In: 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET), pp. 90–95. IEEE (2019)

    Google Scholar 

  4. Axon, L.: Privacy-awareness in blockchain-based PKI. CDT technical paper series 21, 15 (2015)

    Google Scholar 

  5. Barbosa, M., Farshim, P.: Certificateless signcryption. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, pp. 369–372 (2008)

    Google Scholar 

  6. Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005). https://doi.org/10.1007/11593447_28

    Chapter  Google Scholar 

  7. Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_4

    Chapter  Google Scholar 

  8. Cheng, G., Chen, Y., Deng, S., Gao, H., Yin, J.: A blockchain-based mutual authentication scheme for collaborative edge computing. IEEE Trans. Comput. Soc. Syst. 9(1), 146–158 (2021)

    Article  Google Scholar 

  9. Clack, C.D., Bakshi, V.A., Braine, L.: Smart contract templates: essential requirements and design options. arXiv preprint arXiv:1612.04496 (2016)

  10. Fromknecht, C., Velicanu, D., Yakoubov, S.: A decentralized public key infrastructure with identity retention. IACR Cryptology ePrint Archive 2014/803 (2014)

    Google Scholar 

  11. Gervais, M., Sun, L., Wang, K., Li, F.: Certificateless authenticated key agreement for decentralized WBANs. In: Shen, B., Wang, B., Han, J., Yu, Y. (eds.) FCS 2019. CCIS, vol. 1105, pp. 268–290. Springer, Singapore (2019). https://doi.org/10.1007/978-981-15-0818-9_18

    Chapter  Google Scholar 

  12. Guo, X., Guo, Q., Liu, M., Wang, Y., Ma, Y., Yang, B.: A certificateless consortium blockchain for IoTs. In: 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), pp. 496–506. IEEE (2020)

    Google Scholar 

  13. Li, F., Han, Y., Jin, C.: Certificateless online/offline signcryption for the Internet of Things. Wireless Netw. 23(1), 145–158 (2017). https://doi.org/10.1007/s11276-015-1145-3

    Article  Google Scholar 

  14. Li, R., Song, T., Mei, B., Li, H., Cheng, X., Sun, L.: Blockchain for large-scale Internet of Things data storage and protection. IEEE Trans. Serv. Comput. 12(5), 762–771 (2018)

    Article  Google Scholar 

  15. Lynn, B.: PBC library: the pairing-based cryptography library (2013). https://crypto.stanford.edu/pbc/. Accessed 1 May 2022

  16. Mandal, S., Bera, B., Sutrala, A.K., Das, A.K., Choo, K.K.R., Park, Y.: Certificateless-signcryption-based three-factor user access control scheme for IoT environment. IEEE Internet Things J. 7(4), 3184–3197 (2020)

    Article  Google Scholar 

  17. Pang, L., Kou, M., Wei, M., Li, H.: Anonymous certificateless multi-receiver signcryption scheme without secure channel. IEEE Access 7, 84091–84106 (2019)

    Article  Google Scholar 

  18. Pang, L., Wei, M., Li, H.: Efficient and anonymous certificateless multi-message and multi-receiver signcryption scheme based on ECC. IEEE Access 7, 24511–24526 (2019)

    Article  Google Scholar 

  19. Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000). https://doi.org/10.1007/s001450010003

    Article  MATH  Google Scholar 

  20. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  21. Tseng, Y.F., Fan, C.I.: Provably CCA-secure anonymous multi-receiver certificateless authenticated encryption. J. Inf. Sci. Eng. 34(6), 1517–1541 (2018)

    Google Scholar 

  22. Wang, W., Xu, H., Alazab, M., Gadekallu, T.R., Han, Z., Su, C.: Blockchain-based reliable and efficient certificateless signature for IIoT devices. IEEE Trans. Ind. Inform. 18(10), 7059–7067 (2022)

    Article  Google Scholar 

  23. Xu, G., Dong, J., Ma, C.: A certificateless encryption scheme based on blockchain. Peer-to-Peer Netw. Appl. 14, 2952–2960 (2021). https://doi.org/10.1007/s12083-021-01147-w

    Article  Google Scholar 

  24. Xu, S., Chen, X., He, Y.: EVchain: an anonymous blockchain-based system for charging-connected electric vehicles. Tsinghua Sci. Technol. 26(6), 845–856 (2021)

    Article  Google Scholar 

  25. Yuan, Y., Wang, F.: Current status and prospects of blockchain technology development. Acta Automatica Sinica 42(4), 481–494 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunxiao Ye .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jin, Y., Ye, C., Yang, M., Ye, C. (2022). One-Time Anonymous Certificateless Signcryption Scheme Based on Blockchain. In: Gao, H., Wang, X., Wei, W., Dagiuklas, T. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 460 . Springer, Cham. https://doi.org/10.1007/978-3-031-24383-7_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-24383-7_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-24382-0

  • Online ISBN: 978-3-031-24383-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics