计算机科学 ›› 2024, Vol. 51 ›› Issue (8): 440-446.doi: 10.11896/jsjkx.230400203

• 信息安全 • 上一篇    

一种基于国密算法的区块链无证书加密机制

向宴颉1, 黄晓芳1, 向科峰2, 郑继楠1   

  1. 1 西南科技大学计算机科学与技术学院 四川 绵阳 621010
    2 西南科技大学制造科学与工程学院 四川 绵阳 621010
  • 收稿日期:2023-04-28 修回日期:2023-09-27 出版日期:2024-08-15 发布日期:2024-08-13
  • 通讯作者: 黄晓芳(xf.swust@qq.com)
  • 作者简介:(yanjie0697@outlook.com)
  • 基金资助:
    国家自然科学基金(62076209);国家自然科学基金青年科学基金(61702429);四川省科技厅重点研发项目(21ZDYF3119,2022YFG0321)

Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm

XIANG Yanjie1, HUANG Xiaofang1, XIANG Kefeng2, ZHENG Ji’nan1   

  1. 1 School of Computer Science and Technology,Southwest University of Science and Technology,Mianyang,Sichuan 621010,China
    2 School of Manufacturing Science and Engineering,Southwest University of Science and Technology,Mianyang,Sichuan 621010,China
  • Received:2023-04-28 Revised:2023-09-27 Online:2024-08-15 Published:2024-08-13
  • About author:XIANG Yanjie,born in 1996,postgra-duate.Her main research interests include blockchain and cryptography.
    HUANG Xiaofang,born in 1977,Ph.D,professor,master supervisor.Her main research interests include blockchain and digital signature.
  • Supported by:
    National Natural Science Foundation of China(62076209),Young Scientists Fund of the National Natural Science Foundation of China(61702429) and Key Research and Development Projects of the Technology Department of Sichuan Province,China(21ZDYF3119,2022YFG0321).

摘要: 区块链因具有分布式、不可篡改和不变性的特点而广受关注,但区块链中使用的国际密码算法存在一定的后门安全隐患。现基于国密算法SM2,结合无证书密码机制,提出了一种基于区块链的无证书公钥加密(Certificateless Public Key Encryption,CL-PKE)方案。该方案不依赖双线性配对,降低了计算成本,消除了证书管理和密钥托管问题,并且利用区块链不可篡改和可追溯的优点,实现了用户对公钥的更新与撤销,同时能够对抗无证书机制中的Type-1和Type-2型敌手。该方案基于计算性Diffie-Hellman问题(Computational Diffie-Hellman Problem,CDHP)的困难性,在随机预言模型中被证明在自适应选择密文攻击下具有不可区分性。最后进行性能分析与测试,结果表明,与现有CL-PKE方案相比,该方案的计算效率至少提升11%。

关键词: 无证书, SM2, 区块链, 随机预言模型

Abstract: The blockchain has attracted widespread attention because of its distributed,non-tamperable and inherent immutability features.However,the international cryptographic algorithm used in the blockchain has certain backdoor security risks.Based on the national secret algorithm SM2,this paper proposes a blockchain-based certificateless public key encryption(CL-PKE)scheme,which combines with the certificateless cryptographic mechanism.The scheme does not use bilinear pairing,reduces computa-tional cost,and eliminates certificate management and key escrow issues.At the same time,due to tamper proof and traceable of blockchain,the scheme realizes the user’s updating and revocation of the public key,so as to fight against Type-1 and Type-2 adversaries in the certificateless mechanism.Based on the difficulty of the computational Diffie-Hellman problem(CDHP),it is proved that the scheme is indistinguishable under the adaptive chosen ciphertext attack in the random prediction model.Finally,after analysis and testing,compared with the existing CL-PKE schemes,the computational efficiency of this scheme is increased by at least 11%.

Key words: Certificateless, SM2, Blockchain, Random oracle model

中图分类号: 

  • TP309
[1]AO W,FU S,ZHANG C,et al.A secure identity authentication scheme based on blockchain and identity-based cryptography[C]//2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology(CCET).IEEE,2019:90-95.
[2]YANG H Z,YUAN L Y,WANG S.Blockchain Design Based on SM2 National Secret Algorithm Optimization [J].Computer Engineering and Design,2021,42(3):622-627.
[3]PEOPLE’s BANK of CHINA.Financial distributed ledger technology security specification[EB/OL].(2020-02-05)[2022-12-07].https://www.cfstc.org/bzgk/gk/view/yulan.jsp?i_id=1855&s_file_id=1741.
[4]Al-RIYAMI S S,PATERSON K G.Certificateless public keycryptography [C]//International Conference on the Theory and Application of Cryptology and Information Security.Springer,2003:452-473.
[5]SU Y,LI Y P,CAO Q,et al.Authorized certificateless conjunctive keyword search on encrypted EHRs from WSNs [J].Journal of Information Science & Engineering,2020,36(4):881-896.
[6]XU G X,DONG J N,MA C,et al.A certificateless encryption scheme based on blockchain [J].Peer-to-Peer Networking and Applications,2021,14(5):2952-2960.
[7]ZHOU Y W,YANG B.Leakage-resilient CCA2-secure certifi-cateless public-key encryption scheme without bilinear pairing [J].Information Processing Letters,2018,130:16-24.
[8]ZHENG X Y,ZHOU Y Y,YE Y L,et al.A cloud data deduplication scheme based on certificateless proxy re-encryption [J].Journal of Systems Architecture,2020,102:101666.
[9]HASSAN A,WANG Y,ELHABOB R,et al.An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments [J].Journal of Systems Architecture,2020,109:101776.
[10]MA M M,FAN S Q,FENG D G.Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine [J].Journal of Information Security and Applications,2020,55:102652.
[11]SENOUCI M R,BENKHADDRA I,SENOUCI A,et al.An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks [J].Journal of Systems Architecture,2021,119:102271.
[12]ZHANG R R,NIU H X.Security-enhanced certificatelesssearchable public key encryption scheme [J].Microelectronics &Computer,2022,39(6):89-98.
[13]QU H P,YAN Z,LIN X J,et al.Certificateless public key encryption with equality test [J].Information Sciences,2018,462:76-92.
[14]LUO M,PEI Y S,CHEN A.Cross-domain encryption schemewith equality test for wireless body area networks [J].Wireless Networks,2022,28(5):2105-2114.
[15]CHENG C H.A Certificateless encryption algorithm based on SM2 [J].Journal of Cryptologic Research,2021,8(1):87-95.
[16]ODOOM J,HUANG X F,DANSO S A.COVID-19 and future pandemics:A blockchain-based privacy-aware secure borderless travel solution from electronic health records[J].Software:Practice and Experience,2022,52(10):2263-2287.
[17]PAN W,HUANG X F.Identity Management and Authentica-tion Model Based on Smart Contracts [J].Computer Enginee-ring and Design,2020,41(4):915-919.
[18]TOMAR A,TRIPATHI S.BCAV:Blockchain-based certificate-less authentication system for vehicular network [J].Peer-to-Peer Networking and Applications,2022,15(3):1733-1756.
[19]WANG Z H,HUO R,WANG S.A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid [J].Future Internet,2022,14(4):119.
[20]XU G X,DONG J N,MA C,et al.A Certificateless Signcryption Mechanism Based on Blockchain for Edge Computing [J].IEEE Internet of Things Journal,2022,10(14):11960-11974.
[21]ELTAYIEB N,SUN L,WANG K,et al.A certificateless proxy re-encryption scheme for cloud-based blockchain [C]//International Conference on Frontiers in Cyber Security.Springer,2019:293-307.
[22]STATE CRYPTOGRAPHY ADMINISTRATION.SM2 Elliptic Curve Public Key Cryptography Algorithm [S].Beijing:China Standard Press.2010.
[23]MONRAT A A,SCHELÉN O,ANDERSSON K.A survey of blockchain from the perspectives of applications,challenges,and opportunities [J].IEEE Access,2019,7:117134-117151.
[24]CUI J,ZHANG J,ZHONG H,et al.An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks[J].Information Sciences,2018,451:1-15.
[25]YANG X,TIAN T,WANG J,et al.Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing[J].Peer-to-Peer Networking and Applications,2022,15(5):2270-2288.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!