Figures
Abstract
With the development of cloud computing and the application of Internet of Things (IoT) in the smart grid, a massive amount of sensitive data is produced by the terminal equipment. This vast amount of data is subject to various attacks during transmission, from which users must be protected. However, most of the existing schemes require a large amount of network bandwidth resources and cannot ensure the receiver’s anonymity. To solve these shortcomings, we construct a broadcast signcryption scheme supporting equality test based on certificateless cryptosystem. The scheme employs a symmetric encryption algorithm to improve encryption and transmission efficiency; The Lagrange interpolation theorem is used to encrypt the user’s identity to ensure the privacy preservation of terminal devices; And a trusted third party is used to eliminate duplicated ciphertext for identical messages using an equality test, resulting in efficient network bandwidth utilization. Experimental analysis shows that our work has greater advantages in the field of practical broadcast services.
Citation: Niu S, Dong R, Fang L (2023) Certificateless broadcast signcryption scheme supporting equality test in smart grid. PLoS ONE 18(9): e0290666. https://doi.org/10.1371/journal.pone.0290666
Editor: Pandi Vijayakumar, University College of Engineering Tindivanam, INDIA
Received: March 24, 2023; Accepted: August 12, 2023; Published: September 7, 2023
Copyright: © 2023 Niu et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are within the experimental analysis section of the manuscript.
Funding: This work was supported by the National Natural Science Foundation of China (No.62241207) and Gansu Science and Technology Program (22JR5RA158). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Competing interests: The authors have declared that no competing interests exist.
Introduction
The use of intelligent Internet of Things (IoT) devices brings great convenience to data communication. Wireless sensor network has been widely applied in the smart grid. Considering wireless sensor networks transmit information over public channels, and that power data and sensitive information may be distorted in the transmission process, there are security risks associated with the smart grid. Many fields of study use it in conjunction with cryptography algorithms to guarantee the security of sensitive information. Amos Fiat and Moni Naor [1] first proposed broadcast encryption, which is suitable for one-to-many communication where the broadcaster transmits the encrypted data to an authorized receiver. Each receiver can obtain ciphertext and decrypt messages with their private key. Compared with the traditional one-to-one encryption model, broadcast encryption can reduce the computation and communication overhead. Therefore, it has significant application and value in IoT scenarios [2–4]. Unfortunately, they are unable to guarantee the privacy of users or the transmission of sensitive information. As the information collected by IoT equipment is sensitive, users expect a guarantee of the security of data transmission and communication. A certificateless cryptosystem is proposed to deal with the key escrow problem. It can realize efficient and secure transmission of broadcast ciphertext [5–8]. Considering the same broadcast ciphertext may be generated by different encryption methods, it will occupy bandwidth resources on resource-limited devices, limit the applicability of the application environment, and cause great inconvenience and waste of space. The ciphertext equality test [9–11] can match ciphertexts on broadcasters and cloud servers, so as to realize the de-duplication of redundant copies and save bandwidth resources.
Currently, there exist malicious attackers in the smart grid, causing the smart grid to face some security threats, such as user forging smart meter data, unauthorized user access to sensitive information leading to privacy leakage, and malicious attacker stealing data when wireless sensor networks transmit information over public channels. Thus, the scheme demands the intelligent power supply system encrypt data and send ciphertext to users in the form of broadcasting, so as to transmit users’ power information efficiently and securely. Broadcast signcryption achieves data sharing between broadcast servers and authorized receivers. Unfortunately, many existing broadcast signcryption schemes have some shortcomings. They are unable to realize the private preservation of receiver identities and need a lot of bandwidth resources.
Based on the current security threat in smart grid and the shortcomings of existing schemes, we propose a broadcast signcryption scheme that supports equality test based on certificateless cryptosystem. First, the scheme solves the key escrow problem in identity-based cryptosystem by using certificateless cryptosystem and ensures the receiver’s anonymity by using the Lagrange interpolation theorem. Second, our proposed scheme can be proven secure under the Random Oracle Model. In addition, the proposed scheme realizes the function of data de-duplication by using equality test and lightweight broadcast signcryption by reducing computation cost.
Motivation and contributions
To realize the private preservation of smart meter’s identities and the confidentiality of sensitive information, while also saving bandwidth resources, we propose a broadcast signcryption scheme supporting equality test based on certificateless cryptosystem. The main contributions of our work as follows:
- The scheme ensures the privacy of the user’s identity. Not only are illegal receivers unable to obtain the sender’s identity but the receiver also do not know the other receiver’s identity.
- The proposed scheme uses equality test to realize the function of data de-duplication. To achieve efficient utilization of network bandwidth, the duplicate ciphertext of the information generated by different encryption methods is de-duplicated by a trusted third party.
- We realize lightweight broadcast signcryption by reducing the bilinear pairing operation with a high computation cost in unsigncryption. The experimental analysis showed that the computing efficiency was higher than existing schemes, and had greater advantages in practical applications.
Organization
The organization of this paper as follows. We survey the related works in Section 2. In Section 3, we briefly describe the background. Our scheme and correctness are present in Section 4. Security proof is given in Section 5. In Section 6, we present the performance evaluation. Finally, we conclude the work in Section 7.
Related works
Duan et al. [12] first construct the broadcast signcryption scheme in combination with the signcryption algorithm and the broadcast transmission. Unfortunately, the scheme does not meet the security requirements of adaptive chosen-ciphertext attack. Based on the problem of one-to-one single transmission in the traditional signcryption scheme, broadcast signcryption solves the shortcomings of communication efficiency in information transmission. Since the invention of broadcast signcryption, many academics and practitioners have propose the scheme to meet various security performance requirements [13, 14]. Zhang et al. [13] construct a signcryption scheme that resists quantum attacks based on lattice and identity cryptosystem. [14, 15] designed the efficient signcryption algorithm that allowed the sender to transmit multi-messages to multi-receivers and analyzed the efficiency of each scheme. Qiu et al. [15] design a broadcast scheme based on certificateless cryptosystem and applied it to the IoT, lowering the computation cost of the receiver by outsourcing the gateway signature verification operation. However, there is the problem of key escrow. Peng et al. [16] connected the edge node with the IoT device. Edge computing can reduce the computation burden of terminal devices and the delay of network transmission. However, the ciphertext of this scheme hasn’t the authorization set of the receiver. Due to the risk of location privacy leakage in the charging process of electric vehicles. Kumar et al. [17] design an electric vehicle charging framework combined with grid encryption technology. Alagarsamy et al. [18] propose an Exponentiated Multilinear Vectorized Certificateless Signcryption (EMV-CLSC) scheme, which reduces memory usage when processing multiple data and improves computation efficiency. [19–21] propose lightweight and efficient access control signcryption schemes based on the certificateless cryptosystem. Ullah et al. [20] propose an anonymous certificateless signcryption scheme using elliptic curves to guarantee security requirements in Internet of Vehicles, but this scheme only signcrypt single message and is not suitable for the multi-message environments. Sarvesh et al. [22] present a multi-signcryption scheme with public verifiability to reduce the threats of private key escrow and replay attacks. Unfortunately, These schemes fail to consider the processing of redundant data generated by different encryption methods for the same information. Luo et al. [23] propose the signcryption scheme for data communication between different network domains, but can’t ensure the privacy of receivers. Khan et al. [24] set a smaller key unit based-identity signcryption, which is not applicable to equipment with limited resources, and there is the risk of the receiver’s privacy leaking. Mandal et al. [25] design a user access control scheme that fails to achieve the receiver’s privacy preservation. Shen et al. [26] propose a lightweight and secure data transmission protocol for wireless body area networks, which support the multidisciplinary treatment but exist a risk of leakage of the partial private key.
Aiming at addressing the shortcomings and improving the efficiency of existing schemes, we propose a broadcast signcryption scheme that supports equality test based on certificateless cryptosystem. Our proposed work ensures the receiver’s anonymity and information integrity and confidentiality, while also the proposed scheme realizes the function of data de-duplication by using equality test and lightweight broadcast signcryption by reducing computation cost.
Background
Hard problems
We give several hard problems to demonstrate the security of our work.
Decision Diffie-Hellman (DDH) problem [9]. Given P, aP, bP, W ∈ G, where , it is hard for the probabilistic polynomial time (PPT) to determines whether W = abP with non-negligible advantage.
Bilinear Diffie-Hellman (BDH) problem [22]. Given P, aP, bP, cP ∈ G, where and P denotes the generator of group G, compute e(P, P)abc ∈ GT, if Pr[A(P, aP, bP, cP) = e(P, P)abc] ≥ ε, the advantage of the adversary to solve the BDH problem.
Computational Diffie-Hellman (CDH) problem [23]. Given aP, bP ∈ G, compute abP element where are unknown and P denotes the generator of group G.
Decision Bilinear Diffie-Hellman (DBDH) problem. For , ∃P, aP, bP, cP ∈ G, it is hard for PPT to distinguish e(P, P)abc by a non-negligible advantage.
System model
The smart power grid relies on intelligent technology, such as wireless sensors, to realize information collection and data transmission. As can be seen from Fig 1, detailed information is collected through sensor equipment. It is assumed that the application field deploys wireless sensor network nodes in multiple power jurisdictions and monitoring areas. The wireless sensor network nodes collect power data and other data in real-time and upload them to the aggregation base station. Considering wireless sensor networks transmit information over public channels, and that power data and sensitive information may be distorted in the transmission process, there are security risks associated with the smart grid. Many fields of study use it in conjunction with cryptography algorithms to guarantee the security of sensitive information.
As is shown in Fig 2, our proposed system model includes five entities: Intelligent power supply system, Trusted Third Party (TTP), Key Generation Center (KGC), Smart meter and Cloud Server (CS). After the KGC generates public and private key for the intelligent power supply system and the smart meter, the intelligent power supply system will signcrypt the collected information such as the meter operation status and smart meter data, and then sends ciphertext to CS and TTP for ciphertext equality test. TTP deletes the duplicate ciphertext of the information generated by different encryption methods. When the CS broadcasts ciphertext to smart meter, the authorized device can unsigncrypt ciphertext using private key independently.
KGC. Assuming KGC is a fully trusted entity, the device set and the intelligent power supply system send a registration request before the broadcaster broadcasts the message. After receiving the request, the KGC generates public and private key for the smart meter and intelligent power supply system to ensure the device’s legality.
Intelligent power supply system. After receiving the information gathered by wireless sensor network monitoring equipment, it selects a group of equipment to collect messages, encrypt message and upload it in the monitoring area, and then sends signature to the TTP for ciphertext equality test.
TTP. In order to rid the ciphertext of duplicated data, the TTP checks whether the received ciphertext has a copy of the same information generated by different encryption methods on the CS.
Smart meter. The smart meter submits registration request for legal identities to the key generation center. When the CS broadcasts ciphertext to smart meter, the authorized device can send verification information to a trusted third party for ciphertext matching. After obtaining the correct response, the ciphertext can be decrypted independently.
CS. The trusted third party can be operated by the CS to match the duplicate data of the ciphertext generated and transmitted throughout the entire broadcast process. Although ciphertext is stored on the CS, it can’t get any information about ciphertext from the broadcaster.
Formal definition
For the signcryption scheme supporting equality test in smart grid, we give the detailed definition as follows for algorithm:
Setup (1λ): Inputs security parameter λ, KGC returning public parameter Pars, TTP’s private key xT and the master key s.
Set secret-value (IDi): It takes Pars and the receiver’s identity IDi as input and returns xi as the receiver’s secret value.
Extract partial-private key (s, Xi, IDi): The inputs are the IDi of the receiver, the master key s, the public key of the receiver Xi and the public parameters Pars, and it returns the partial private key zi.
Set private and public key (IDi, zi, Wi, Pars): Inputs the IDi of the receiver, the partial private key zi and Pars, and returns the private key of receiver (di, yi) and the public key of receiver (Xi, Yi).
Signcryption (Pars, IDi, Xi, M): The inputs are the public parameters Pars, a set {IDi, Xi}i=1,2,⋯,n and the message M. The outputs are ciphertext σ.
Unsigncryption (yi, σ, ID): The inputs are the public parameter Pars, a private key of the smart meter yi, a set {IDi}i=1,2,⋯,n of the receiver’s identity, ciphertext σ, outputs recovered message and verify the message using the broadcaster’s public key.
Equality-test (CT, CT′): TTP executes this algorithm. The inputs are the public parameter Pars, the private key xT and two ciphertexts CT and CT′. The output is 1 if CT and CT′ are same message generated by different encryption methods, otherwise, returns 0.
Security model
In order to ensure broadcasting safety, the proposed work must satisfy the security of message, define indistinguishability of chosen multiple identities and chosen ciphertext attack security (IND-CMID-CCA) by polynomial time simulating the game between adversary and challenger, ensure strong unforgeability of chosen multiple identities and ciphertext attack security (SUF-CMID-CCA) and ensure anonymity of chosen multiple identities and ciphertext attack security (ANON-CMID-CCA).
Game 1: IND-CMID-CCA security
This game is played between adversary and challenger
under the IND-CMID-CCA security model. The security model is defined as follows:
Setup: takes the security parameter λ as input and returns the public parameters Pars and the master key s,
sends the public parameter Pars to
and keeps s. Then,
selects a random identity from set {IDi}i=1,2,⋯,n.
Phase 1: runs an adaptive prediction query, and
responds to the query.
Challenge: sends two equal-length plaintext M0 and M1 to
.
randomly selects a bit b ∈ {0, 1} to obtain ciphertext σ* and returns it to
.
Phase 2: executes a series of inquiries as in Phase 1, but not allowed to perform extract partial-private key and unsigncryption queries if the user who replaced public key.
Guess: A guess bit b* ∈ {0, 1} is generated by .
wins the game if b* = b.
Definition 1: Our work satisfies the indistinguishability of chosen multiple identities and the chosen ciphertext attack security (IND-CMID-CCA) if there are no adversaries having a non-negligible advantage to win Game 1.
Game 2: SUF-CMID-CCA security
The adversary interacts with the challenger
under the SUF-CMID-CCA security model. We defined the security model as follows:
Setup: It is similar to the setup in Game 1.
Attack: It is similar to the attack in phase 1 of Game 1.
Forgery: uses target user set {IDi}i=1,2,⋯,n and plaintext to forge signatures σ*. If any user in the target user set {IDi}i=1,2,⋯,n unsigncrypt ciphertext σ* correctly,
wins game. In this process, the ciphertext cannot be obtained by a series of inquiry, and all restrictions are consistent with those in phase 2 of Game 1.
Definition 2: Our proposed work can resist the strong unforgeability of chosen multiple identities and ciphertext attack (SUF-CMID-CCA) if there are no adversaries having a non-negligible advantage to win Game 2.
Game 3: ANON-CMID-CCA security
The adversary interacts with the challenger under the ANON-CMID-CCA security model. We defined the security model as follows:
Setup: taking λ as input, and returning Pars and s as output, sends Pars to
and keeps s. Then,
randomly selects identity set L = {ID0, ID1} to
.
Phase 1: This is the same as Game 1.
Challenge: selects challenge target’s identity L* = {ID2, ID3, ⋯, IDn} and plaintext to
.
randomly select a bit b ∈ {0, 1}, formalizes the challenge ciphertext CT* with a new target identity list L* = {IDb, ID2, ID3, ⋯, IDn} and sends CT* to
.
Phase 2: It is the same as Game 1.
Guess: Finally, a guess bit b* ∈ {0, 1} is returned by .
wins this game if b* = b.
Definition 3. Our work satisfies the anonymity of chosen multiple identities and ciphertext attack security (ANON-CMID-CCA) if there are no adversaries having a non-negligible advantage to win Game 3.
The proposed scheme
We construct a certificateless broadcast signcryption scheme that supports equality test. In the scheme, the broadcaster can signcrypt message for many different receivers, and receiver belonging to the authorization group can unsigncrypt ciphertext to obtain plaintext. Table 1 presents the notions in our proposed scheme. The scheme includes five algorithms:
Setup: Inputs security parameter λ and returns bilinear pairing e : G1 × G2 → GT, where G1 = 〈P1〉, G2 = 〈P2〉 and they have same the prime order p. Define six hash functions as: H : {0, 1}* → G1, ,
,
, H4 : GT → G1,
and
is a one-way function. The KGC randomly selects two numbers
and
to compute the public key PKpub = s ⋅ P1, PKT = xT ⋅ P2, master secret key s keeps secret. Pars = {P1, P2, G1, G2, GT, p, PKT, PKpub, e, f(), H, H1, H2, H3, H4, H5, (E, D)} are system public parameters and (E(⋅), D(⋅)) is the encryption/decryption algorithm of the Advanced Encryption Standard.
Keygen: User and KGC run the keygen algorithm to obtain user’s private and public keys.
- Set secret-value: A receiver selects number
at random to act as secret value. It then computes Xi = di ⋅ P1 and returns IDi ∥ Xi to the KGC;
- Partial-private key: A receiver submits its identity IDi, master secret key s, public key Xi and Pars to KGC. KGC selects a number
and computes Wi = ωi ⋅ P1, hi = H(IDi), yi = (ωi + hi ⋅ s) mod p, generates user’s partial-private key zi = yi + H1(IDi, Xi, Wi), KGC sends hi, zi and Wi to user;
- Set private and public key: Computes private key yi = zi − H1(IDi, Xi, Wi) and public key Yi = yi ⋅ P1, the partial-private key is true where yi ⋅ P1 = Wi + hi ⋅ PKpub, otherwise, outputs ⊥. User’s public key PKi = (Xi, Yi) and private key SKi = (di, yi).
Signcryption: The public parameters Pars, message M, receiver’s identity IDi, sender’s private key SKs = (ds, ys), public key PKs = (Xs, Ys) and the public key PKT of TTP are taken as inputs and then performs as follows:
- Constructs
, xi = H2(IDi), clearly, Ci(xi) = 1, Ci(xj) = 0, i ≠ j;
- Selects number
,
,
and tag
at random, computes K = H3(a), C0 = (f(M) + f(τ)) ⋅ PKT, C1 = k ⋅ P2,C2 = e(P1, r1 ⋅ P2)k ⋅ a, C3 = EK(M ∥ τ), C4 = e(P1, P2)f(τ), Vi = e(Yi, C1), Fi = e(P1 ⋅ H1(IDi, Xi, Wi), C1), Ti = H4(Vi ⋅ Fi) + r1 ⋅ Xi,
, CT = (C0, C1, C2, C3, C4, Qj);
- Randomly selects a number
, computes R = r ⋅ P1, hs = H5(M, IDs, Xs, Ys, R) and u = ds + ys + hs ⋅ r;
- The final broadcast ciphertext is σ = (CT, u, R).
Unsigncryption: The broadcast ciphertext σ, receiver’s public key (Xi, Yi) and receiver’s identity IDi are taken as inputs to perform the following steps:
- Computes
;
- Computes
,
and plaintext M = DK (C3);
- Checks if
. Return true if it holds, otherwise, return ⊥;
- Computes hs = H5(M, IDs, Xs, Ys, R), if u ⋅ P1 = Xs + Ys + hs ⋅ R, receiver accepts message (IDi ∥ M)i=1,2,⋯,n, otherwise, outputs ⊥.
Equality-test: Given two ciphertexts CT = (C0, C1, C2, C3, C4, Q1, Q2, ⋯, Qn) and . TTP checks if
, returns 1 if it holds and ⊥ otherwise.
Correctness: The correctness of our proposed work as follows:
- yi ⋅ P1 = (ωi + hi ⋅ s) ⋅ P1 = Wi + hi ⋅ PKpub
-
-
-
-
-
Security proof
We proof the security of our work under the hard problem and security model in Section 4.
Theorem 1. If the BDH problem in (G1, G2) is hard, our work is secure against the IND-CMID-CCA of the .
Proof: Simulator is created to solve the hard problems of BDH in (G1, G2). Inputs (P1, β1P1, β2P1, V) of the DDH problem and checks
.
and
to simulates the security game.
Setup: sets system public key PKpub = αP1 = φ(αP2) and PKT = β1P1, and then sends system parameter Pars = {P1, P2, G1, G2, p, e, H, H1, H2, H3, H4, H5, (E, D)} to
. After receiving Pars,
outputs the target identity {IDi}i=1,2,⋯,n.
Phase 1: sets H, {Hi}i=1,2,⋯,5 and runs a series of queries, returns the results to
and the query results are stores in lists H, H1, H2, H3, H4, H5.
H query: After receiving the query from the adversary on the target identity {IDi}i=1,2,⋯,n, creates (IDi, Wi, ψi, θi) in the list H and initializes it to null. If the identity exists in the tuple, returns Wi. Otherwise, randomly selects a bit ψi ∈ {0, 1} and an integer θi ∈ Zp. If ψi = 0, computes Wi = θi ⋅ P1, otherwise, sets Wi = θi ⋅ bP1 = θi ⋅ φ(bP2) and adds (IDi, Wi, ψi, θi) to the list H. Finally,
returns Wi to
;
H1 query: Inputs (IDi, Xi, Wi), runs H1 query, checks whether (IDi, Xi, Wi, di) exists in the list H1. If it does, returns di to
. Otherwise,
randomly selects
to sends it to
and stores (IDi, Xi, Wi, di) in the list H1;
H2 query: A list L is created and initialized to empty. If the identity in the (IDi, xi) query already exists in the list, returns H2(IDi) = xi. Otherwise, randomly selects an integer
sends to
and adds (IDi, xi) to the list L. Finally, it returns xi to
;
H3 query: The identity IDi is taken as input. creates a tuple (IDi, ki) in the list H3 and initializes it to empty. If (IDi, ki) exists in the list H3, it will be returned ki to
. Otherwise, randomly selects ki ∈ Zp and returns to the adversary and add it to the tuple (IDi, ki) of the list H3;
H4 query: Inputs the identity IDi, creates (IDi, Ti) in the list H4 and initializes it to empty. If (IDi, Ti) exists in the list H4, it returns Ti to
. Otherwise, randomly selects an integer Ti ∈ G1 and returns to
and adds it to (IDi, Ti) of the list H4;
H5 query: (M, IDi, Xi, Yi, R) is taken as input. If (M, IDi, Xi, Yi, R, hk) exists in the list H5, send hk to
, otherwise, randomly selects
and sends it to
and store (M, IDi, Xi, Yi, R, hk) in the list H5;
Key query: If (IDi, SKi, PKi, xi, zi) exists in the list Hi, keep tuple (IDi, SKi, PKi, xi, zi). Otherwise, responds as follows:
- If IDi = IDj,
randomly selects
, computes Xi = xi ⋅ P1, Wi = ωi ⋅ P1, yi = ωi + H1 (IDi, Xi, Wi) ⋅ s mod p, Yi = yi ⋅ P1, PKi = (Xi, Yi) and updates tuple (IDi, SKi, PKi, xi, zi) in the list Hi and the tuple (IDi, Xi, Wi, di) in the list H1 respectively;
- If IDi ≠ IDj,
randomly selects
, computes Xi = xi ⋅ P1, Yi = yi ⋅ P1, PKi = (Xi, Yi), SKi = (di, yi) and updates tuple (IDi, SKi, PKi, xi, zi) in list Hi and tuple (IDi, Xi, Wi, di) in list H1 respectively.
Secret-value query: After receiving the request from , it sends xi to
if (IDi, SKi, PKi, xi, zi) exists in list Hi.
Extract Partial-private key query: Inputs IDi, executes as follows:
- If IDi = IDj,
sends ⊥ to
;
- If IDi ≠ IDj, and if (IDi, SKi, PKi, wi, xi, zi) exists in the list Hi,
sends partial-private key zi to
, otherwise, runs key query and returns tuple (IDi, SKi, PKi, xi, zi) and sends partial-private key zi to
.
Private query: After receiving the request from ,
sends public key PKi to
if (IDi, SKi, PKi, xi, zi) exists in list Hi, otherwise,
runs key query, return (IDi, SKi, PKi, xi, zi) and sends public key PKi to
and responds as follows:
- If IDi = IDj,
sends ⊥ to
;
- If IDi ≠ IDj, if (IDi, SKi, PKi, wi, xi, zi) in exists in the list Hi,
sends private key SKi to
, otherwise,
runs key query, return tuple (IDi, SKi, PKi, xi, zi) and sends SKi to
.
Public key replace query: If tuple (IDi, SKi, PKi, wi, xi, zi) exists in the list Hi after receiving the request, replaces PKi with public key
, otherwise,
will be stored tuple (IDi, SKi, PKi, xi, zi) in list Hi.
Signcryption query: If IDi ≠ IDj, i = 1, 2, ⋯, n, runs the private key query, output SKs, ciphertext CT, and sends CT to
, otherwise,
respond as follows:
- Selects IDi, computes xi = H2(IDi);
- Constructs
;
- Randomly selects the integers
,
and
, computes C1 = k ⋅ P2, K = H3(A) and C3 = EK(M ‖ τ);
- Randomly selects
, computes R = r ⋅ P1, hs = H5(M, IDs, Xs, Ys, R) and u = ds + ys + hs ⋅ r;
- Outputs CT = (C0, C1, C2, C3, C4, Qt) to
.
Unsigncryption query: The adversary requires to run unsigncryption query on ciphertext CT and identity IDi. After receiving the request, if IDi = IDj, i = 1, 2, ⋯, n,
sends ⊥ to
, otherwise,
responds as follows:
- Inputs the broadcaster identity IDs, authorized device identity IDi and ciphertext CT, and then computes W = r1 ⋅ P1;
- Computes K′ = H4(C2/e(W, C1));
- If i = 1 in the H4 query,
recovers the plaintext M ∥ IDi = D(K′, C3) from the list H4, uses the symmetric key K′ and returns it to
. Checks if C0 = f(M) ⋅ PKT + f(τ) ⋅ PKT. If so, the execution is completed. If i does not exceed the number of H4 queries,
returns M to
, otherwise, outputs ⊥;
- If R = hi ⋅ P2 − u ⋅ Yi,
returns M to
, otherwise, outputs ⊥.
Challenge: selects two equal-length M0, M1 and challenger identity and public key set S* = (ID1/X1, ⋯, IDl/Xl). In phase 1,
cannot uses the identity IDi ∈ S* to runs the private key query. If ψi = 1 at the tuple (IDi, Wi, ψi, θi) in list H1,
responds as follows:
- Sets
;
- Computes
, constructs
;
- Randomly selects r1 ∈ Zp, Ri ∈ G1, computes Tj = Ri + r1 ⋅ Xj and
;
- Randomly selects A ∈ GT and τ ∈ {0, 1}t, computes K = H3(A),
and
, β ∈ {0, 1};
- Computes
and
;
- Sends
to
.
Phase 2: runs a series of adaptive queries consistent with those in phase 1, but challenge ciphertext CT* cannot be decrypted. If IDi ∈ S*, extract partial-private key query is not allowed.
Guess: Given a bit β′ ∈ {0, 1}, if V = β1β2P1, CT* is valid. Suppose must run H5 query as
, H(IDi) = qi ⋅ b ⋅ P1 and PKpub = aP1,
computes
. Therefore, our scheme is secure against the IND-CMID-CCA.
Theorem 2. If the DDH problem in G1 is hard, our proposed scheme is secure against the IND-CMID-CCA of .
Proof: Simulator is created to solve the hard problems of DDH in G1, Let P1, aP1, bP1, W ∈ G1, where
are unknown, judge whether W = abP1.
and
to simulates the security game.
Setup: sets system public key PKpub = αP1 and PKT = βP1, and then sends system parameter Pars = {P1, P2, G1, G2, p, e, H, H1, H2, H3, H4, H5, (E, D)} to .
Phase 1: adaptively issue a series of queries.
H query: After receiving the query from the adversary on the target identity {IDi}i=1,2,⋯,n, creates (IDi, Wi) in the list H and initializes it to null. If the identity exists in the tuple, returns Wi. Otherwise, randomly selects an integer θi ∈ Zp, computes Wi = θi ⋅ P1 and adds (IDi, Wi, ψi) to the list H1. Finally,
returns Wi to
.
H1,H2,H3,H4,H5 query: It is similar to the H1,H2,H3,H4,H5 query in Theorem 1.
Public key query: After receiving the query from the adversary on the target identity {IDi}i=1,2,⋯,n, if the (IDi, Wi, xi) has existed in the list H and initializes it to null. If the identity exists in the tuple, returns Wi. Otherwise, randomly selects a bit ψi ∈ {0, 1} and an integer ai ∈ Zp. If ψi = 0, computes Xi = ai ⋅ P1, otherwise, sets Xi = ai ⋅ bP1 and adds (IDi, ai, Xi, ψi) to the list H. Finally, returns Xi to
.
Unsigncryption query: It is similar to the Unsigncryption query in Theorem 1.
Challenge: It is similar to the Challenge in Theorem 1.
Phase 2: runs a series of adaptive queries consistent with those in phase 1, but challenge ciphertext CT* cannot be decrypted.
Guess: Given its guess β, if ,
wins the game with non-ignorable advantage. When W = abP1,
is valid since Ti = H4(Vi ⋅ Fi) + r1 ⋅ W = H4(Vi ⋅ Fi) + r1⋅(abP1), C4 = e(P1, P2)f(τ) = e(P1, P2)f(b). This means that r1 = a, τ = b in the signcryption. Thus, if
breaks the proposed work,
is able to solve the DDH problem.
Theorem 3. Define one-way functions H and {Hi}i=1,2,⋯,5. If the CDH problem in (G1, G2) is hard, the scheme is secure against the SUF-CMID-CCA of .
Proof: The simulator is created to solve CDH problem in (G1, G2),
interacts with
as follows:
Setup: It is similar to the setup in Theorem 1.
Phase 1: It is similar to Phase 1 in Theorem 1.
Public key query: If the challenge identity is received,
will sends PKpub = a ⋅ P1 to
, otherwise, randomly selects
and computes PKpub = xi ⋅ P1.
Private key query: If the challenge identity is received,
return ⊥, otherwise, run private key query and sends
to
.
Signcryption query: runs the following steps on the identity:
- If
,
randomly selects
, computes R = ai ⋅ P1 − bi ⋅ Yi;
- If
,
generates ciphertext to
.
Forge: If ,
uses the identity set L = {ID1, ID2, ⋯, IDn} to forge a signature σ* = (CT*, u*). If σP1 = Xi + Yi + hi ⋅ R holds,
wins the game, defines
and r ⋅ Xi = yi(PKi + PKpub),
computes
and outputs αβP = r ⋅ Xi − PKi, otherwise, outputs the terminator ⊥.
Theorem 4. Define one-way functions H and {Hi}i=1,2,⋯,5. If the DBDH problem in (G1, G2) is hard, our work is secure against the ANON-CMID-CCA of .
Proof: Simulator is created to solve DBDH problem in (G1, G2).
interacts with
as follows:
Setup: The simulator sets system public key PKpub = aP1, sends system parameter Pars = {G1, G2, GT, p, e, f(), H, H1, H2, H3, H4, H5, (E, D)} to ,
outputs the target identity {IDi}i=1,2,⋯,n.
Phase 1: executes a series of adaptive queries consistent with Theorem 1.
Challenge: cannot run partial private key query on
. Message M, two identities and public key sets with different lengths
and
are taken as inputs.
runs as follows:
- Sets
;
- Retrieves
on the identity
, if
, outputs ⊥, if
, sets
and
. Then,
is obtained by H3 query;
- Computes
,
, i ∈ {2, 3, ⋯, l};
- Constructs
, i ∈ {2, 3, ⋯, l};
- Randomly selects integer
, Ri ∈ G1, i ∈ {2, 3, ⋯, l}, computes Tj = Ri + r1 ⋅ Xj and
;
- Computes
, i ∈ {β, 2, 3, ⋯, l};
- Randomly selects integers A ∈ Gp and τ ∈ Zp, computes
,
, β ∈ {0, 1};
- Computes
and
;
- Sends challenge ciphertext
to
.
Phase 2: runs adaptive queries consistent with those of phase 1, but is not allowed to perform partial-private key, public key replace, unsigncryption query for identity
.
Guess: guesses b′, if b′ = b,
outputs 1, otherwise, outputs 0.
Analysis: Simulator is indistinguishable from the scheme in the above game. When Z = e(P1, P2)αβc, assuming that k* = c.
where K = H3(A) is a random element. Therefore,
view Mβ as independent, and our work is secure against the ANON-CMID-CCA.
Theorem 5. If the DDH problem in G1 is hard, our proposed work is secure against the ANON-CMID-CCA of .
Proof: Simulator is created to solve the hard problems of DDH in G1, Let P1, aP1, bP1, W ∈ G1, where
are unknown, judge whether W = abP1.
and
to simulates the security game.
Setup: It is similar to the Setup in Theorem 2.
Phase 1: It is similar to the Phase 1 in Theorem 2.
Challenge: It is similar to the Challenge in Theorem 2.
Phase 2: is not allowed performed public key query and unsigncryption query with ID, where
.
Guess: Given β′, if , outputs 1, otherwise, outputs 0.
Analysis: Simulator is indistinguishable from the scheme in the above game. When W = abP1, assuming that r1 = a. In addition to W is a random element of group G1,
where K = H3(A) is a random element. Therefore,
view Mβ as independent, and our work is secure against the ANON-CMID-CCA.
Performance evaluation
Functional comparison
We evaluate the functions of the proposed work with those of five existing broadcast signcryption schemes [15, 22–25]. From Table 2, scheme [15] outsource verification operation to gateway, which reduces the computation cost of the receiver at decryption stage. However, there is the problem of key escrow. Scheme [22] presents a multi-signcryption scheme with public verifiability to reduce the threats of private key escrow and replay attack but can’t eliminate duplicate copies in the system. The scheme [23] propose the certificateless broadcast signcryption scheme, but can’t ensure the privacy of the receiver. Scheme [24] set a smaller key unit based-identity signcryption, which is not applicable to equipment with limited resources, and there is the risk of the receiver’s privacy leaking. The scheme [25] design a user access control scheme which fails to achieve receiver’s privacy preservation and the computation cost of unsigncryption is higher than the proposed work.
Efficiency analysis
We compare the computation times of our work with those of the existing schemes [15, 22] as shown in Table 3. The communication cost between our work and other schemes is shown in Table 4.
1) Computation cost. We compare the computation times of our work and existing schemes [15, 22] is shown in Table 3. Te, Tm, Tp, Th, TInv represents the time of executing exponential, multiplication, bilinear pairing, hash, and multiplication inversion operation, respectively. The operation time sequence is Tp > Te > Tm > Th > TInv. n represents the number of users. The computation cost increases as n grows.
2) Communication cost. We compare the communication costs of the proposed work with those of schemes [15, 22] in shown Table 4. We set =16 bytes and |G|=32 bytes. n represents the number of users. The ciphertext size are
,
,
in [15, 22] and our scheme, respectively. The communication cost grows linearly with n from Table 4.
Experimental analysis
The experiment is using bilinear pairing-based cryptography library under the Linux operating system. The parameter type of bilinear pairing package is Type-A. It uses the C programming language and is programmed and executed on 2.60 GHz CPU and 8 GB RAM PC. We compare the computation time of [15, 22] and our proposed scheme of signcryption and unsigncryption algorithms, and set the number of devices from the smart grid at 10, 20, 30, 40, 50, 60, 70 and 80, respectively. The number of devices on the smart grid can dynamically adjusted to manage authorized devices more flexibly.
As is shown in Fig 3. that the computation time of our work in data signcryption stage is lower than scheme [22]. Although computation efficiency of scheme [15] is higher than our scheme, the proposed work has higher security and practical application value. It is also concluded from Fig 4. that the computation efficiency of our work in the data unsigncryption stage is higher than existing schemes [15, 22]. When the number of devices is 20, the computation time of our scheme is 46.565ms, [15, 22] are 122.278ms and 242.153ms respectively. Fig 5. show that the communication costs of our work are lower than [22]. The computation of unsigncryption and communication cost of [22] is highly than our proposed scheme. The core reason is equality test cannot be performed. Although communication costs of [15] is higher than our scheme, our proposed work has higher security and can better guarantee the privacy of users.
Conclusion
Currently, there exist malicious attackers in the smart grid, causing the smart grid to face some security threats, such as user forging smart meter data, unauthorized user access to sensitive information leading to privacy leakage, and so on. To realize the private preservation of smart meter’s identities and the confidentiality of sensitive information, guarantee the security of data communication and solve the problem of insufficient transmission network bandwidth resources, we construct a broadcast signcryption scheme supporting equality test based on certificateless cryptosystem. The scheme realizes the anonymity between receivers and ensures the privacy of data. In addition, our work also achieves data deletion function of the same ciphertext, which greatly saves the network bandwidth and ciphertext storage space. Finally, an analysis of the existing broadcast signcryption schemes and our proposed scheme reveals that our proposed work has higher practical application value.
References
- 1.
Fiat A.; Naor M. Broadcast encryption. Santa Barbara, CA, USA, 22–26 August 1993; pp. 480–491
- 2. Lu Y, Li J, Zhang Y. Privacy-preserving and pairing-free multirecipient certificateless encryption with keyword search for cloud-assisted IIoT. IEEE Internet Things J. 2020,7 (4): 2553–2562.
- 3. Deng L. Anonymous certificateless multi-receiver encryption scheme for smart community management systems. PLoS Genet. 2011 Oct;7(10):e1002337.
- 4. Wang B, Rong J, Zhang S, Liu L. Research on data security of multicast transmission based on certificateless multi-recipient signcryption in AMI. Proc. Int. J. Electr. Power Energy Syst. 2020,121:1–8.
- 5. Pka B, Mk A, Sma C. Cryptanalysis of a pairing-free certificateless signcryption scheme- ScienceDirect. ICT Express, 2021, 7(2):200–204.
- 6. Ullah I, Alkhalifah A, Rehman S U, et al. An anonymous certificateless signcryption scheme for internet of health things. IEEE Access, 2021, 9: 101207–101216.
- 7. Thorncharoensri P, Susilo W, Chow Y W. Privacy-preserving file sharing on cloud storage with certificateless signcryption. Theoretical Computer Science, 2022.
- 8. Noor F, Kordy T A, Alkhodre A B, et al. Securing wireless body area network with efficient secure channel free and anonymous certificateless signcryption. Hindawi Limited, 2021.
- 9. Zhang J, Ou P. Privacy-preserving multi-receiver certificateless broadcast encryption scheme with de-duplication. Sensors, 2019, 19(15):3370. pmid:31370322
- 10.
Bhosale A H, MAnjrekar A A. Attribute-based storage control with smart de-duplication filter using hybrid cloud. Pune, India: IEEE, 2018.1–6.
- 11. Periasamy J K, Latha B. An enhanced secure content de-duplication identification and prevention (ESCDIP) algorithm in cloud environment. Neural Computing and Applications, 2020, 32(2): 485–494.
- 12.
Duan S, Cao Z. Efficient and provably secure multi-receiver identity-based signcryption. Springer, Berlin, Heidelberg, 2006: 195–206.
- 13. Zhang X J, Xu C X, et al. Efficient multi-receiver identity-based signcryption from lattice assumption. International Journal of Electronic Security and Digital Forensics: IJESDF, 2018, 10(1): 20–38.
- 14. Pang L, Wei M, Li H. Efficient and anonymous certificateless multi-message and multi-receiver signcryption scheme based on ECC. IEEE Access, 2019: 1–1.
- 15. Qiu J, Fan K, Zhang K, et al. An efficient multi-message and multi-receiver signcryption scheme for heterogeneous smart mobile IoT. IEEE Access, 2019, 7:180205–180217.
- 16. Peng C, Chen J, Obaidat M S, et al. Efficient and provably secure multireceiver signcryption scheme for multicast communication in edge computing. IEEE Internet of Things Journal, 2020, 7(7): 6056–6068.
- 17. Kumar G, Saha R, Rai M K, et al. A privacy-preserving secure framework for electric vehicles in IoT using matching market and signcryption. IEEE Transactions on Vehicular Technology, 2020, 69(7): 7707–7722.
- 18. Alagarsamy S, Rajagopalan S P. Exponentiated multiple message communication using certificateless signcryption for mobile network security. International Journal of Computer Applications, 2017, 178(7): 13–24.
- 19. Zhou C. An improved lightweight certificateless generalized signcryption scheme for mobile-health system. International Journal of Distributed Sensor Networks, 2019, 15(1).
- 20. Ullah I, Khan MA, Alsharif MH, Nordin R. An Anonymous Certificateless Signcryption Scheme for Secure and Efficient Deployment of Internet of Vehicles. Sustainability, 2021, 13(19):10891.
- 21. Gao G M, Peng X G, Jin L Z. Efficient access control scheme with certificateless signcryption for wireless body area networks. International Journal of Network Security, 2019, 21(3):428–437.
- 22. tanwar Sarvesh, Kumar Anil. Extended identity based multi-signcryption scheme with public verifiability. Journal of Information and Optimization Sciences, 2018, 39(2):503–517.
- 23. Ming L, Yi L, Yuwei W, et al. Secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the IoT. Security and Communication Networks, 2018, 2018:1–10.
- 24. Khan M A, Ullah I, Nisar S, et al. Multiaccess edge computing empowered flying ad hoc networks with secure deployment using identity-based generalized signcryption. Mobile Information Systems, 2020.
- 25. Mandal S, Bera B, Sutrala A K, et al. Certificateless-signcryption-based three-factor user access control scheme for IoT environment. IEEE Internet of Things Journal, 2020, 7(4): 3184–3197.
- 26. Shen J, Chen X, Zhang J, Xiang Y. Lightweight and certificateless multireceiver secure data transmission protocol for wireless body area networks. IEEE Transactions on Dependable and Secure Computing, 2022, 19(3): 1464–1475