Computer Science ›› 2024, Vol. 51 ›› Issue (8): 440-446.doi: 10.11896/jsjkx.230400203

• Information Security • Previous Articles    

Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm

XIANG Yanjie1, HUANG Xiaofang1, XIANG Kefeng2, ZHENG Ji’nan1   

  1. 1 School of Computer Science and Technology,Southwest University of Science and Technology,Mianyang,Sichuan 621010,China
    2 School of Manufacturing Science and Engineering,Southwest University of Science and Technology,Mianyang,Sichuan 621010,China
  • Received:2023-04-28 Revised:2023-09-27 Online:2024-08-15 Published:2024-08-13
  • About author:XIANG Yanjie,born in 1996,postgra-duate.Her main research interests include blockchain and cryptography.
    HUANG Xiaofang,born in 1977,Ph.D,professor,master supervisor.Her main research interests include blockchain and digital signature.
  • Supported by:
    National Natural Science Foundation of China(62076209),Young Scientists Fund of the National Natural Science Foundation of China(61702429) and Key Research and Development Projects of the Technology Department of Sichuan Province,China(21ZDYF3119,2022YFG0321).

Abstract: The blockchain has attracted widespread attention because of its distributed,non-tamperable and inherent immutability features.However,the international cryptographic algorithm used in the blockchain has certain backdoor security risks.Based on the national secret algorithm SM2,this paper proposes a blockchain-based certificateless public key encryption(CL-PKE)scheme,which combines with the certificateless cryptographic mechanism.The scheme does not use bilinear pairing,reduces computa-tional cost,and eliminates certificate management and key escrow issues.At the same time,due to tamper proof and traceable of blockchain,the scheme realizes the user’s updating and revocation of the public key,so as to fight against Type-1 and Type-2 adversaries in the certificateless mechanism.Based on the difficulty of the computational Diffie-Hellman problem(CDHP),it is proved that the scheme is indistinguishable under the adaptive chosen ciphertext attack in the random prediction model.Finally,after analysis and testing,compared with the existing CL-PKE schemes,the computational efficiency of this scheme is increased by at least 11%.

Key words: Certificateless, SM2, Blockchain, Random oracle model

CLC Number: 

  • TP309
[1]AO W,FU S,ZHANG C,et al.A secure identity authentication scheme based on blockchain and identity-based cryptography[C]//2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology(CCET).IEEE,2019:90-95.
[2]YANG H Z,YUAN L Y,WANG S.Blockchain Design Based on SM2 National Secret Algorithm Optimization [J].Computer Engineering and Design,2021,42(3):622-627.
[3]PEOPLE’s BANK of CHINA.Financial distributed ledger technology security specification[EB/OL].(2020-02-05)[2022-12-07].https://www.cfstc.org/bzgk/gk/view/yulan.jsp?i_id=1855&s_file_id=1741.
[4]Al-RIYAMI S S,PATERSON K G.Certificateless public keycryptography [C]//International Conference on the Theory and Application of Cryptology and Information Security.Springer,2003:452-473.
[5]SU Y,LI Y P,CAO Q,et al.Authorized certificateless conjunctive keyword search on encrypted EHRs from WSNs [J].Journal of Information Science & Engineering,2020,36(4):881-896.
[6]XU G X,DONG J N,MA C,et al.A certificateless encryption scheme based on blockchain [J].Peer-to-Peer Networking and Applications,2021,14(5):2952-2960.
[7]ZHOU Y W,YANG B.Leakage-resilient CCA2-secure certifi-cateless public-key encryption scheme without bilinear pairing [J].Information Processing Letters,2018,130:16-24.
[8]ZHENG X Y,ZHOU Y Y,YE Y L,et al.A cloud data deduplication scheme based on certificateless proxy re-encryption [J].Journal of Systems Architecture,2020,102:101666.
[9]HASSAN A,WANG Y,ELHABOB R,et al.An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments [J].Journal of Systems Architecture,2020,109:101776.
[10]MA M M,FAN S Q,FENG D G.Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine [J].Journal of Information Security and Applications,2020,55:102652.
[11]SENOUCI M R,BENKHADDRA I,SENOUCI A,et al.An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks [J].Journal of Systems Architecture,2021,119:102271.
[12]ZHANG R R,NIU H X.Security-enhanced certificatelesssearchable public key encryption scheme [J].Microelectronics &Computer,2022,39(6):89-98.
[13]QU H P,YAN Z,LIN X J,et al.Certificateless public key encryption with equality test [J].Information Sciences,2018,462:76-92.
[14]LUO M,PEI Y S,CHEN A.Cross-domain encryption schemewith equality test for wireless body area networks [J].Wireless Networks,2022,28(5):2105-2114.
[15]CHENG C H.A Certificateless encryption algorithm based on SM2 [J].Journal of Cryptologic Research,2021,8(1):87-95.
[16]ODOOM J,HUANG X F,DANSO S A.COVID-19 and future pandemics:A blockchain-based privacy-aware secure borderless travel solution from electronic health records[J].Software:Practice and Experience,2022,52(10):2263-2287.
[17]PAN W,HUANG X F.Identity Management and Authentica-tion Model Based on Smart Contracts [J].Computer Enginee-ring and Design,2020,41(4):915-919.
[18]TOMAR A,TRIPATHI S.BCAV:Blockchain-based certificate-less authentication system for vehicular network [J].Peer-to-Peer Networking and Applications,2022,15(3):1733-1756.
[19]WANG Z H,HUO R,WANG S.A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid [J].Future Internet,2022,14(4):119.
[20]XU G X,DONG J N,MA C,et al.A Certificateless Signcryption Mechanism Based on Blockchain for Edge Computing [J].IEEE Internet of Things Journal,2022,10(14):11960-11974.
[21]ELTAYIEB N,SUN L,WANG K,et al.A certificateless proxy re-encryption scheme for cloud-based blockchain [C]//International Conference on Frontiers in Cyber Security.Springer,2019:293-307.
[22]STATE CRYPTOGRAPHY ADMINISTRATION.SM2 Elliptic Curve Public Key Cryptography Algorithm [S].Beijing:China Standard Press.2010.
[23]MONRAT A A,SCHELÉN O,ANDERSSON K.A survey of blockchain from the perspectives of applications,challenges,and opportunities [J].IEEE Access,2019,7:117134-117151.
[24]CUI J,ZHANG J,ZHONG H,et al.An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks[J].Information Sciences,2018,451:1-15.
[25]YANG X,TIAN T,WANG J,et al.Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing[J].Peer-to-Peer Networking and Applications,2022,15(5):2270-2288.
[1] ZANG Wenyang, LYU Jinlai. Study on Time Rotation Notary Group Model Based on Threshold Signature [J]. Computer Science, 2024, 51(8): 403-411.
[2] SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379.
[3] LI Zhiyuan, XU Binglei, ZHOU Yingyi. Blockchain Anonymous Transaction Tracking Method Based on Node Influence [J]. Computer Science, 2024, 51(7): 422-429.
[4] ZHU Jun, ZHANG Guoyin, WAN Jingjing. Study on Data Security Framework Based on Identity and Blockchain Integration [J]. Computer Science, 2024, 51(6A): 230400056-5.
[5] LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14.
[6] TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8.
[7] KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6.
[8] GENG Qian, CHUAI Ziang, JIN Jian. Operational Consistency Model Based on Consortium Blockchain for Inter-organizational Data Exchange [J]. Computer Science, 2024, 51(6A): 230800145-9.
[9] TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7.
[10] ZANG Hongrui, YANG Tingting, LIU Hongbo, MA Kai. Study on Cryptographic Verification of Distributed Federated Learning for Internet of Things [J]. Computer Science, 2024, 51(6A): 230700217-5.
[11] ZHANG Ruirong, NIU Baoning, FAN Xing. Multi-attribute Blockchain Decentralization Degree Measurement Model [J]. Computer Science, 2024, 51(5): 382-389.
[12] LI Fengyun, CHEN Mingming, WANG Lin, LI Peng , JU Xianyin. Study on Trust Management Mechanism of Internet of Vehicles Based on Blockchain [J]. Computer Science, 2024, 51(4): 381-387.
[13] LIU Wei, LIU Yuzhao, TANG Congke, WANG Yuanyuan, SHE Wei, TIAN Zhao. Study on Blockchain Based Federated Distillation Data Sharing Model [J]. Computer Science, 2024, 51(3): 39-47.
[14] WANG Dong, LI Zheng, XIAO Bingbing. Blockchain Coin Mixing Scheme Based on Homomorphic Encryption [J]. Computer Science, 2024, 51(3): 335-339.
[15] DONG Hao, ZHAO Hengtai, WANG Ziyao, YUAN Ye, ZHANG Aoqian. Parallel Transaction Execution Models Under Permissioned Blockchains [J]. Computer Science, 2024, 51(1): 124-132.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!