Abstract
Certificate-less (CL) signature schemes were presented to deal with key escrow issue in ID based signature. In recent years a number of digital signatures schemes with bilinear pairing have been presented to maintain information security and integrity. Acutely, the greater part of them endure intent security invasion. They don’t enforce in terms of computing and dissemination complications. Many researchers have proposed different schemes on anonymity for multi receiver identity based cryptography. In this paper an attempt has been made to propose an efficient CL Digital Multi-Receiver (CL-DMS) scheme with anonymity without bilinear pairing which is secure against foregeability, key replacement and key escrow attack. Our motivation is to design a CL DMS that simulcast a message with high level of computation efficiency and employs security that only proficient recipients can fetch the message. This will also include the non-repudiation as well as the time replay attack. We presented an enhanced and efficient scheme, which is secure against Type 1, and Type II attacks. We also compare the proposed scheme with some existing schemes in terms of computation and communication cost with higher level of security.
Similar content being viewed by others
References
Yu Y et al (2007) Efficient identity-based signcryption scheme for multiple receivers. In: International conference on autonomic and trusted computing. Springer, Berlin
Hafizul Islam SK et al (2017) A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography. Int J Comput Math 94(1):39–55
He D, Chen J, Zhang R (2012) An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int J Commun Syst 25(11):1432–1442
Du H, Wen Q (2009) Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Comput Standards Interfaces 31(2):390–394
Harn L, Ren J, Lin C (2009) Design of DL-based certificateless digital signatures. J Syst Softw 82(5):789–793
Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Asiacrypt, vol 2894, pp 452–473
Joux A (2009) Introduction to identity-based cryptography. In: Identity-based cryptography. Cryptology and information security series, vol 2. IOS, Amsterdam, pp. 1–12
Hu BC, Wong DS, Zhang Z, Deng X (2007) Certificateless signature: a new security model and an improved generic construction. Des Codes Cryptogr 42(2):109–126
Gangishetti R, Gorantla MC, Das ML, Saxena A (2006) Identity based multisignatures. Informatica 17(2):177–186
Hu B, Wong D, Zhang Z, Deng X (2006) Key replacement attack against a generic construction of certificateless signatur. In: Advances in privacy ACISP 2006, lecture notes in computer science, vol 4058. Springer, Berlin, pp. 235–246
Baek J, Safavi-Naini R, Susilo W (2005) Certificateless public key encryption without pairing. In: International conference on information security, LNCS, vol 3650. Springer, Berlin, pp 134–148
Cheng ZH, Comley R (2005) Efficient certificateless public key encryption. IACR Cryptology ePrint Archive, Report 2005/012
Dent AW, Kudla C (2005) On proofs of security for certificateless cryptosystems. Cryptology ePrint Archive, Report 2005/348. http://eprint.iacr.org/2005/348
Baek J, Safavi-Naini R, Susilo W (2005). Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: International workshop on public key cryptography. Springer, Berlin, pp 380–397
Pang L et al (2016) A novel multi-receiver signcryption scheme with complete anonymity. PLoS ONE 11(11):e0166173
Pang L et al (2013) Completely anonymous multi-recipient signcryption scheme with public verification. PLoS ONE 8(5):e63562
Zhang Z, Xu J, Feng D (2006) Certificateless public-key signature: security model and efficient construction. In: Advances in ACNS 2006, lecture notes in computer science, vol 3989. Springer, Berlin, pp 293–308
Chen T-S, Huang K-H, Chung Y-F (2004) Digital multisignature scheme based on the elliptic curve cryptosystem. J Comput Sci Technol 19(4):570–573
Chen X, Zhang F, Kim K (2003) A new ID-based group signature scheme from bilinear pairings. IACR Cryptology ePrintArchive, p 116
Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proc. CRYPTO, LNCS, vol 196. Springer, pp 47–53
Miller VS (1995) Use of elliptic curves in cryptography. In: Proceeding of the advances of cryptology (Crypto’85). Springer, New York, pp 417–426
Tanwar S, Kumar A (2017) An efficient multi-receiver certificate less digital multisignature scheme with anonymity based on ECC. In: 3rd International conference on cyber security ICCS 2017, 12–13 Aug 2017. Rajasthan Technical University, Kota
Tanwar S, Kumar A (2016) A proposed scheme for remedy of man-in-the-middle attack on certificate authority. Int J Inf Secur Priv (IJISP) 11(3):1–14. https://doi.org/10.4018/IJISP.2017070101
Lee B, Boyd C, Dawson E, Kim K, Yang J, Yoo S (2004) Secure key issuing in ID-based cryptography. In: Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation, vol 32. Australian Computer Society, Inc., pp 69–74
Yang B, Guo H (2014) A hierarchical identity-based signature scheme. Appl Mech Mater 696:173
Itakura K, Nakamura K (1983) A public-key cryptosystem suitable for digital multisignatures. NEC Research & Development 71, pp 1–8
Durán Díaz R et al (2010) A review of multisignatures based on RSA. DIGITAL.CSIC, pp. 1–7
Choon JC, Cheon JH (2003) An identity-based signature from gap Diffie-Hellman groups. In: International workshop on public key cryptography. Springer, Berlin
Kurosawa K (2002) Multi-recipient public-key encryption with shortened ciphertext. In: Naccache D, Paillier P (eds) PKC. LNCS, vol 2274. Springer, Heidelberg, pp 48–63
Giri D, Srivastava PD (2007) An improved efficient multisignature scheme in group communication systems. In: International conference on advanced computing and communications. ADCOM 2007. IEEE
Liu D, Luo P, Dai Y (2007) Attack on digital multisignature scheme based on elliptic curve cryptosystem. J Comput Sci Technol 22(1):92–94
Bellare M, Boldyreva A, Staddon J (2003) Randomness re-use in multi-recipient encryption schemes. In: International workshop on public key cryptography. Springer, Berlin
Cheng L, Wen Q (2013) A secure and efficient certificateless short signature scheme. J Eng Sci Technol Rev 6(2):35–40
Chien H-Y (2012) Improved anonymous multi-receiver identity-based encryption. Comput J 55(4):439–446
Shields C, Levine BN (2000) A protocol for anonymous communication over the internet. In: Proceedings of the 7th ACM conference on computer and communications security. ACM
Lal S, Kushwah P (2009) Anonymous ID based signcryption scheme for multiple receivers. IACR Cryptology ePrintArchive, p 345
Fan C-I, Huang L-Y, Ho P-H (2010) Anonymous multireceiver identity-based encryption. IEEE Trans Comput 59(9):1239–1249
Dong G, Gao F, Shi W, Gong P (2014) An efficient certificateless blind signature scheme without bilinear pairing. Anais da Academia Brasileira de Ciências 86(2):1003–1011
Zhang B, Xu Q (2010) An ID-based anonymous signcryption scheme for multiple receivers. Int J Adv Sci Technol 20:9–24
Choi KY, Park JH, Lee DH (2011) A new provably secure certificateless short signature scheme. Comput Math Appl 61(7):1760–1768
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Rights and permissions
About this article
Cite this article
Tanwar, S., Kumar, A. An efficient multi-receiver certificate less digital multisignature scheme with anonymity. CSIT 8, 311–318 (2020). https://doi.org/10.1007/s40012-020-00274-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40012-020-00274-8