A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm

被引:3
|
作者
Zou, Jinglin [1 ]
He, Debiao [1 ]
Bi, Sheng [2 ]
Wu, Libing [1 ]
Liu, Zhe [3 ]
Peng, Cong [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] Changjiang River Sci Res Inst, Wuhan 250031, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Sch Cyber Sci & Engn, Nanjing 210016, Peoples R China
来源
HIGH-CONFIDENCE COMPUTING | 2023年 / 3卷 / 01期
基金
中国国家自然科学基金;
关键词
SM2; Certificateless multireceiver encryption; Provable security; MULTIRECEIVER SIGNCRYPTION SCHEME; BROADCAST ENCRYPTION; RESEARCH ISSUES; EFFICIENT; BLOCKCHAIN; INTERNET;
D O I
10.1016/j.hcc.2023.100103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Multi-receiver Encryption (MRE) scheme can meet the secure data transmission requirements in multicast and broadcast scenarios. To meet compliance, critical information infrastructure in China should be protected with Chinese national commercial cryptographic algorithms. Designing an MRE scheme based on Elliptic Curve Cryptography (ECC) is one of the current design methods with better flexibility and performance. However, the research on MRE schemes based on SM2 elliptic curve public-key cryptography is still in a blank state. This paper proposes a Certificateless SM2-based Multireceiver Encryption (CL-SM2-MRE) scheme. We prove the security of the CL-SM2-MRE scheme under the Random Oracle Model (ROM) and analyze the performance. (c) 2023 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Secret Sharing based SM2 Digital Signature Generation using Homomorphic Encryption
    Long, Yihong
    Cheng, Minyang
    2019 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2019), 2019, : 252 - 256
  • [42] Improved Anonymous Multi-receiver Identity-Based Encryption
    Chien, Hung-Yu
    COMPUTER JOURNAL, 2012, 55 (04): : 439 - 446
  • [43] Efficient Revocable Multi-Receiver ID-Based Encryption
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 159 - 169
  • [44] Timing leakage to break SM2 signature algorithm
    Chen, Aidong
    Hong, Chen
    Shang, Xinna
    Jing, Hongyuan
    Xu, Sen
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [45] Improved multi-receiver signcryption scheme
    Li, Huixian
    Chen, Xubao
    Ju, Longfei
    Pang, Liaojun
    Wang, Yumin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50 (07): : 1418 - 1425
  • [46] Secure Multi-party SM2 Signature Based on SPDZ Protocol
    Li, Xiaotong
    Wang, Hao
    Chen, Jiyang
    Li, Shikuan
    Sun, Yuxiang
    Su, Ye
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 85 - 103
  • [47] Multi-receiver certificate-based encryption and application to public key broadcast encryption
    Sur, Chul
    Jung, Chae Duk
    Rhee, Kyung Hyune
    2007 ECSIS SYMPOSIUM ON BIO-INSPIRED, LEARNING, AND INTELLIGENT SYSTEMS FOR SECURITY, PROCEEDINGS, 2007, : 35 - +
  • [48] Efficient multi-receiver identity-based encryption and its application to broadcast encryption
    Baek, J
    Safavi-Naini, R
    Susilo, W
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 380 - 397
  • [49] A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive
    Chenam, Venkata Bhikshapathi
    Sree, Kondepati Dhana
    Ali, Syed Taqi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (06) : 3526 - 3541
  • [50] Multi-message multi-receiver signcryption scheme based on blockchain
    Yang, Xiao Dong
    Wang, Wen Jia
    Shu, Bin
    Li, Mei Juan
    Liu, Rui Xia
    Wang, Cai Fen
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2023, 20 (10) : 18146 - 18172