Skip to main content
Log in

An efficient multi-receiver certificate less digital multisignature scheme with anonymity

  • Original Research
  • Published:
CSI Transactions on ICT Aims and scope Submit manuscript

Abstract

Certificate-less (CL) signature schemes were presented to deal with key escrow issue in ID based signature. In recent years a number of digital signatures schemes with bilinear pairing have been presented to maintain information security and integrity. Acutely, the greater part of them endure intent security invasion. They don’t enforce in terms of computing and dissemination complications. Many researchers have proposed different schemes on anonymity for multi receiver identity based cryptography. In this paper an attempt has been made to propose an efficient CL Digital Multi-Receiver (CL-DMS) scheme with anonymity without bilinear pairing which is secure against foregeability, key replacement and key escrow attack. Our motivation is to design a CL DMS that simulcast a message with high level of computation efficiency and employs security that only proficient recipients can fetch the message. This will also include the non-repudiation as well as the time replay attack. We presented an enhanced and efficient scheme, which is secure against Type 1, and Type II attacks. We also compare the proposed scheme with some existing schemes in terms of computation and communication cost with higher level of security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Yu Y et al (2007) Efficient identity-based signcryption scheme for multiple receivers. In: International conference on autonomic and trusted computing. Springer, Berlin

  2. Hafizul Islam SK et al (2017) A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography. Int J Comput Math 94(1):39–55

    Article  MathSciNet  MATH  Google Scholar 

  3. He D, Chen J, Zhang R (2012) An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int J Commun Syst 25(11):1432–1442

    Article  Google Scholar 

  4. Du H, Wen Q (2009) Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Comput Standards Interfaces 31(2):390–394

    Article  Google Scholar 

  5. Harn L, Ren J, Lin C (2009) Design of DL-based certificateless digital signatures. J Syst Softw 82(5):789–793

    Article  Google Scholar 

  6. Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Asiacrypt, vol 2894, pp 452–473

  7. Joux A (2009) Introduction to identity-based cryptography. In: Identity-based cryptography. Cryptology and information security series, vol 2. IOS, Amsterdam, pp. 1–12

  8. Hu BC, Wong DS, Zhang Z, Deng X (2007) Certificateless signature: a new security model and an improved generic construction. Des Codes Cryptogr 42(2):109–126

    Article  MathSciNet  MATH  Google Scholar 

  9. Gangishetti R, Gorantla MC, Das ML, Saxena A (2006) Identity based multisignatures. Informatica 17(2):177–186

    Article  MathSciNet  MATH  Google Scholar 

  10. Hu B, Wong D, Zhang Z, Deng X (2006) Key replacement attack against a generic construction of certificateless signatur. In: Advances in privacy ACISP 2006, lecture notes in computer science, vol 4058. Springer, Berlin, pp. 235–246

  11. Baek J, Safavi-Naini R, Susilo W (2005) Certificateless public key encryption without pairing. In: International conference on information security, LNCS, vol 3650. Springer, Berlin, pp 134–148

  12. Cheng ZH, Comley R (2005) Efficient certificateless public key encryption. IACR Cryptology ePrint Archive, Report 2005/012

  13. Dent AW, Kudla C (2005) On proofs of security for certificateless cryptosystems. Cryptology ePrint Archive, Report 2005/348. http://eprint.iacr.org/2005/348

  14. Baek J, Safavi-Naini R, Susilo W (2005). Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: International workshop on public key cryptography. Springer, Berlin, pp 380–397

  15. Pang L et al (2016) A novel multi-receiver signcryption scheme with complete anonymity. PLoS ONE 11(11):e0166173

    Article  Google Scholar 

  16. Pang L et al (2013) Completely anonymous multi-recipient signcryption scheme with public verification. PLoS ONE 8(5):e63562

    Article  Google Scholar 

  17. Zhang Z, Xu J, Feng D (2006) Certificateless public-key signature: security model and efficient construction. In: Advances in ACNS 2006, lecture notes in computer science, vol 3989. Springer, Berlin, pp 293–308

  18. Chen T-S, Huang K-H, Chung Y-F (2004) Digital multisignature scheme based on the elliptic curve cryptosystem. J Comput Sci Technol 19(4):570–573

    Article  Google Scholar 

  19. Chen X, Zhang F, Kim K (2003) A new ID-based group signature scheme from bilinear pairings. IACR Cryptology ePrintArchive, p 116

  20. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proc. CRYPTO, LNCS, vol 196. Springer, pp 47–53

  21. Miller VS (1995) Use of elliptic curves in cryptography. In: Proceeding of the advances of cryptology (Crypto’85). Springer, New York, pp 417–426

  22. Tanwar S, Kumar A (2017) An efficient multi-receiver certificate less digital multisignature scheme with anonymity based on ECC. In: 3rd International conference on cyber security ICCS 2017, 12–13 Aug 2017. Rajasthan Technical University, Kota

  23. Tanwar S, Kumar A (2016) A proposed scheme for remedy of man-in-the-middle attack on certificate authority. Int J Inf Secur Priv (IJISP) 11(3):1–14. https://doi.org/10.4018/IJISP.2017070101

    Article  Google Scholar 

  24. Lee B, Boyd C, Dawson E, Kim K, Yang J, Yoo S (2004) Secure key issuing in ID-based cryptography. In: Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation, vol 32. Australian Computer Society, Inc., pp 69–74

  25. Yang B, Guo H (2014) A hierarchical identity-based signature scheme. Appl Mech Mater 696:173

    Article  Google Scholar 

  26. Itakura K, Nakamura K (1983) A public-key cryptosystem suitable for digital multisignatures. NEC Research & Development 71, pp 1–8

  27. Durán Díaz R et al (2010) A review of multisignatures based on RSA. DIGITAL.CSIC, pp. 1–7

  28. Choon JC, Cheon JH (2003) An identity-based signature from gap Diffie-Hellman groups. In: International workshop on public key cryptography. Springer, Berlin

  29. Kurosawa K (2002) Multi-recipient public-key encryption with shortened ciphertext. In: Naccache D, Paillier P (eds) PKC. LNCS, vol 2274. Springer, Heidelberg, pp 48–63

  30. Giri D, Srivastava PD (2007) An improved efficient multisignature scheme in group communication systems. In: International conference on advanced computing and communications. ADCOM 2007. IEEE

  31. Liu D, Luo P, Dai Y (2007) Attack on digital multisignature scheme based on elliptic curve cryptosystem. J Comput Sci Technol 22(1):92–94

    Article  Google Scholar 

  32. Bellare M, Boldyreva A, Staddon J (2003) Randomness re-use in multi-recipient encryption schemes. In: International workshop on public key cryptography. Springer, Berlin

  33. Cheng L, Wen Q (2013) A secure and efficient certificateless short signature scheme. J Eng Sci Technol Rev 6(2):35–40

    Article  Google Scholar 

  34. Chien H-Y (2012) Improved anonymous multi-receiver identity-based encryption. Comput J 55(4):439–446

    Article  Google Scholar 

  35. Shields C, Levine BN (2000) A protocol for anonymous communication over the internet. In: Proceedings of the 7th ACM conference on computer and communications security. ACM

  36. Lal S, Kushwah P (2009) Anonymous ID based signcryption scheme for multiple receivers. IACR Cryptology ePrintArchive, p 345

  37. Fan C-I, Huang L-Y, Ho P-H (2010) Anonymous multireceiver identity-based encryption. IEEE Trans Comput 59(9):1239–1249

    Article  MathSciNet  MATH  Google Scholar 

  38. Dong G, Gao F, Shi W, Gong P (2014) An efficient certificateless blind signature scheme without bilinear pairing. Anais da Academia Brasileira de Ciências 86(2):1003–1011

    Article  Google Scholar 

  39. Zhang B, Xu Q (2010) An ID-based anonymous signcryption scheme for multiple receivers. Int J Adv Sci Technol 20:9–24

    Google Scholar 

  40. Choi KY, Park JH, Lee DH (2011) A new provably secure certificateless short signature scheme. Comput Math Appl 61(7):1760–1768

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarvesh Tanwar.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tanwar, S., Kumar, A. An efficient multi-receiver certificate less digital multisignature scheme with anonymity. CSIT 8, 311–318 (2020). https://doi.org/10.1007/s40012-020-00274-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40012-020-00274-8

Keywords

Mathematical Subject Classification

Navigation