计算机科学 ›› 2024, Vol. 51 ›› Issue (8): 440-446.doi: 10.11896/jsjkx.230400203
• 信息安全 • 上一篇
向宴颉1, 黄晓芳1, 向科峰2, 郑继楠1
XIANG Yanjie1, HUANG Xiaofang1, XIANG Kefeng2, ZHENG Ji’nan1
摘要: 区块链因具有分布式、不可篡改和不变性的特点而广受关注,但区块链中使用的国际密码算法存在一定的后门安全隐患。现基于国密算法SM2,结合无证书密码机制,提出了一种基于区块链的无证书公钥加密(Certificateless Public Key Encryption,CL-PKE)方案。该方案不依赖双线性配对,降低了计算成本,消除了证书管理和密钥托管问题,并且利用区块链不可篡改和可追溯的优点,实现了用户对公钥的更新与撤销,同时能够对抗无证书机制中的Type-1和Type-2型敌手。该方案基于计算性Diffie-Hellman问题(Computational Diffie-Hellman Problem,CDHP)的困难性,在随机预言模型中被证明在自适应选择密文攻击下具有不可区分性。最后进行性能分析与测试,结果表明,与现有CL-PKE方案相比,该方案的计算效率至少提升11%。
中图分类号:
[1]AO W,FU S,ZHANG C,et al.A secure identity authentication scheme based on blockchain and identity-based cryptography[C]//2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology(CCET).IEEE,2019:90-95. [2]YANG H Z,YUAN L Y,WANG S.Blockchain Design Based on SM2 National Secret Algorithm Optimization [J].Computer Engineering and Design,2021,42(3):622-627. [3]PEOPLE’s BANK of CHINA.Financial distributed ledger technology security specification[EB/OL].(2020-02-05)[2022-12-07].https://www.cfstc.org/bzgk/gk/view/yulan.jsp?i_id=1855&s_file_id=1741. [4]Al-RIYAMI S S,PATERSON K G.Certificateless public keycryptography [C]//International Conference on the Theory and Application of Cryptology and Information Security.Springer,2003:452-473. [5]SU Y,LI Y P,CAO Q,et al.Authorized certificateless conjunctive keyword search on encrypted EHRs from WSNs [J].Journal of Information Science & Engineering,2020,36(4):881-896. [6]XU G X,DONG J N,MA C,et al.A certificateless encryption scheme based on blockchain [J].Peer-to-Peer Networking and Applications,2021,14(5):2952-2960. [7]ZHOU Y W,YANG B.Leakage-resilient CCA2-secure certifi-cateless public-key encryption scheme without bilinear pairing [J].Information Processing Letters,2018,130:16-24. [8]ZHENG X Y,ZHOU Y Y,YE Y L,et al.A cloud data deduplication scheme based on certificateless proxy re-encryption [J].Journal of Systems Architecture,2020,102:101666. [9]HASSAN A,WANG Y,ELHABOB R,et al.An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments [J].Journal of Systems Architecture,2020,109:101776. [10]MA M M,FAN S Q,FENG D G.Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine [J].Journal of Information Security and Applications,2020,55:102652. [11]SENOUCI M R,BENKHADDRA I,SENOUCI A,et al.An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks [J].Journal of Systems Architecture,2021,119:102271. [12]ZHANG R R,NIU H X.Security-enhanced certificatelesssearchable public key encryption scheme [J].Microelectronics &Computer,2022,39(6):89-98. [13]QU H P,YAN Z,LIN X J,et al.Certificateless public key encryption with equality test [J].Information Sciences,2018,462:76-92. [14]LUO M,PEI Y S,CHEN A.Cross-domain encryption schemewith equality test for wireless body area networks [J].Wireless Networks,2022,28(5):2105-2114. [15]CHENG C H.A Certificateless encryption algorithm based on SM2 [J].Journal of Cryptologic Research,2021,8(1):87-95. [16]ODOOM J,HUANG X F,DANSO S A.COVID-19 and future pandemics:A blockchain-based privacy-aware secure borderless travel solution from electronic health records[J].Software:Practice and Experience,2022,52(10):2263-2287. [17]PAN W,HUANG X F.Identity Management and Authentica-tion Model Based on Smart Contracts [J].Computer Enginee-ring and Design,2020,41(4):915-919. [18]TOMAR A,TRIPATHI S.BCAV:Blockchain-based certificate-less authentication system for vehicular network [J].Peer-to-Peer Networking and Applications,2022,15(3):1733-1756. [19]WANG Z H,HUO R,WANG S.A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid [J].Future Internet,2022,14(4):119. [20]XU G X,DONG J N,MA C,et al.A Certificateless Signcryption Mechanism Based on Blockchain for Edge Computing [J].IEEE Internet of Things Journal,2022,10(14):11960-11974. [21]ELTAYIEB N,SUN L,WANG K,et al.A certificateless proxy re-encryption scheme for cloud-based blockchain [C]//International Conference on Frontiers in Cyber Security.Springer,2019:293-307. [22]STATE CRYPTOGRAPHY ADMINISTRATION.SM2 Elliptic Curve Public Key Cryptography Algorithm [S].Beijing:China Standard Press.2010. [23]MONRAT A A,SCHELÉN O,ANDERSSON K.A survey of blockchain from the perspectives of applications,challenges,and opportunities [J].IEEE Access,2019,7:117134-117151. [24]CUI J,ZHANG J,ZHONG H,et al.An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks[J].Information Sciences,2018,451:1-15. [25]YANG X,TIAN T,WANG J,et al.Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing[J].Peer-to-Peer Networking and Applications,2022,15(5):2270-2288. |
|