PLoS ONE
Home Heterogeneous deniable authenticated encryption for location-based services
Heterogeneous deniable authenticated encryption for location-based services
Heterogeneous deniable authenticated encryption for location-based services

Competing Interests: The authors have declared that no competing interests exist.

Article Type: research-article Article History
Abstract

The location-based services can provide users with the requested location information. But users also need to disclose their current location to the location-based service provider. Therefore, how to protect user’s location privacy is a major concern. In this paper, we propose a heterogeneous deniable authenticated encryption scheme called HDAE for location-based services. The proposed scheme permits a sender in a public key infrastructure environment to transmit a message to a receiver in an identity-based environment. Our design utilizes a hybrid encryption method combing the tag-key encapsulation mechanism (tag-KEM) and the data encapsulation mechanism (DEM), which is well adopted for location-based services applications. We give how to design an HDAE scheme utilizing a heterogeneous deniable authenticated tag-KEM (HDATK) and a DEM. We also construct an HDATK scheme and provide security proof in the random oracle model. Comprehensive analysis shows that our scheme is efficient and secure. In addition, we give an application of the HDAE to a location-based services system.

Jin,Kan,Chen,Yu,Jin,Xu,and Wang: Heterogeneous deniable authenticated encryption for location-based services

Introduction

The fast expansion of smart devices and mobile networks makes location-based services (LBSs) an integral part of people’s daily lives. Users utilize LBSs to find points of interests, navigate the destination, and inquire public transportation etc. [16]. In all of these requested services, users need to disclose their location information to the location-based service provider (LBSP). Based on location information, LBSP is able to infer some sensitive information about users, such as preferences, social circles, and trajectories. For example, if a user frequently presents location request to the same hospital, the LBSP is able to deduce that the user may have a physical issue.

If the LBSP cooperates with a malicious adversary for pecuniary advantage, there will be significant loss of profits for users. For example, based on the location-based privacy information leaked by a user, a malicious adversary can infer a user’s home address or routine and then commit theft, which seriously threatens user’s personal and property safety. Therefore, protecting users’ location privacy is a major concern.

Authentication plays a very important role in the LBS [716]. Only authorized users can access the LBS. Typically, we utilize digital signature technology to achieve authentication. However, there is also non-repudiation in digital signature. That is, the sender cannot deny the message he/she signed. To resolve this issue, deniable authentication [17] is proposed which has two characteristics: (1) the receiver has the capability of identifying whether a given message is from the sender; (2) any third party is incapable of determining whether the given message is from the sender or the receiver even though the third party colludes with the receiver since the receiver is able to generate a probabilistically indistinguishable transcript from the sender. However, in privacy-preserving scenarios, the transmitted message needs to be encrypted to achieve confidentiality. Wu and Li [18] first presented an identity-based DAE scheme to achieve confidentiality as well as deniable authentication in an efficient approach.

0.1 Motivation and contribution

In order to make the designed scheme more practical, we require the sender and receiver to be in different cryptographic environments. Concretely, we design a heterogeneous deniable authenticated encryption (HDAE) scheme utilizing tag-KEM and DEM hybrid encryption methods. The proposed scheme permits a sender in a public key infrastructure (PKI) setting to deliver a message to a receiver in an identity-based cryptography (IBC) setting. This construction provides security proof in random oracle model (ROM) under the DBDH and BDH assumptions. Our experimental analysis displays that our scheme has a high efficiency and security. Additionally, we design an LBS scheme utilizing our proposed HDAE scheme. On the one hand, it permits the LBSP to affirm whether the ciphertext of the submitted location request is from the user. On the other hand, any third party cannot determine whether the ciphertext of the submitted location request is from the user or the service provider even though the third party colludes with the LBSP since the LBSP has the capability of generating a probabilistically indistinguishable ciphertext from the user.

0.2 Organization

The rest of this paper is arranged below. Section II, Related work is presented. Problem formulation is defined in Section III. We design a formal model for the HDAE in Section IV. Section V, a security model for the HDATK is depicted. An HDAE design is presented in Section VI, and we design an HDATK scheme in Section VII. Performance analysis is discussed in Section VIII. Section IX, we give an HDAE application to the LBS. Conclusion is drawn in Section X.

1 Related work

Related notions, hybrid encryption, deniable authenticated encryption, and heterogeneous deniable authentication are introduced.

Hybrid encryption constitutes a key encapsulation mechanism (KEM) and a data encapsulation mechanism (DEM). The KEM encrypts a session key by a public key, whereas the DEM encrypts the real data by a session key. For large messages, hybrid encryption is the best choice. Cramer and Shoup [19] designed practical and provably secure hybrid KEM/DEM schemes. Abe et al. [20] put forward to a more efficient tag-KEM/DEM scheme. Then, many KEM/DEM schemes [2128] have been proposed. These designs support both components modular design. Sahai et al. [29] put forward to a tag-KEM/DEM scheme by a non-interactive proof method. The proposed scheme can encrypt message with arbitrary length. Baek et al. [30] presented a stateful KEM-DEM scheme. It is highly effective by utilizing a state to produce the random parameters.

Deniable authentication encryption (DAE) is a cryptographic primitive which can accomplish concurrently public key encryption and deniable authentication. Its cost is lower than that needed by deniable authentication-then-encryption manner. The DAE can achieve deniable authentication and confidentiality simultaneously which is well adopted for privacy-protecting scenarios.

Li et al. [31] constructed a DAE scheme with formal security proof. They also constructed an email system based on the designed DAE scheme. Jin et al. [32] constructed a DAE scheme which can realize simultaneously deniable authentication, confidentiality, and ciphertext anonimity. Rasmussen and Gasti [33] proposed a DAE based on two encryption schemes with strong and weak properties. Recently, Huang et al. [34] constructed a DAE scheme for privacy protection with formal security proof. The above mentioned schemes are all in the PKI environment which has public key management problems, including distribution, storage, and revocation. To resolve this issue, a number of identity-based deniable authenticated encryption (IBDAE) schemes have been constructed. Wu and Li [18] constructed an IBDAE scheme which provided formal security proof. Li et al. [35] (denoted by LZJ) proposed an IBDAE scheme for e-mail system. In their scheme, they utilize tag-KEM/DEM hybrid encryption technology which is more suitable for actual applications. Jin and Zhao [36] designed an IBDAE scheme which admitted formal security proof. The aforementioned schemes have key escrow problems, i.e., a third party called private key generator (PKG) knows all user’s private key. To avoid this problem, a certificateless deniable authenticated encryption (CLDAE) scheme [37] has been designed. Recently, Chen et al. [38] proposed a certificateless hybrid KEM/DEM scheme. It separates two parts to provide better security and efficiency.

The aforementioned DAE schemes have a common feature, i.e., the entities of these schemes are all in the same cryptosystem. Such characteristic makes these schemes not well suitable for the LBS system. Li et al. [39] (denoted by LHO) designed two heterogeneous deniable authentication (HDA) schemes. Their designed schemes allowed batch verification to accelerate the authenticators’ verification. Jin et al. [40] constructed an HDA scheme. In their scheme, a sender in a CLC setting delivered a message to a receiver in an IBC setting. However, these schemes do not achieve confidentiality.

2 Problem formulation

2.1 System and security models

There are three entities in the HDAE as shown in Fig 1: a user, an LBSP, and a trusted third party PKG. The location information and the corresponding ciphertext are produced by the user, and the ciphertext are sent to the LBSP. The LBSP can identify the received ciphertext is from the user and generate a probabilistically indistinguishable ciphertext from the user. The PKG is mainly responsible for generating system parameters and LBSP’s private key.

System model.
Fig 1

System model.

To obtain the location-based service that supports privacy-preserving, in the proposed system model, the user sends the ciphertext of location-requested information to the LBSP. Then the LBSP decrypts the received ciphertext and checks whether the decrypted message is location-requested information or a failure symbol ⊥.

2.2 Threat model and security goals

We define an adversary which will act as a user to learn the requested location information of other users. The LBSP is honest-but-curious. It means that it follows the designed scheme, but it may collude with a third party for economic benefits. Additionally, the collusion attack between the LBSP and a third party is concerned in the proposed security goals. Specially, two kinds of security requirements are considered in the constructed scheme.

    Confidentiality: Any information about the submitted location information of a ciphertext cannot be learned by any third party other than the involved entities;

    Deniable authentication: The LBSP has a capability of determining a ciphertext is from the user and creating a ciphertext that is probabilistically indistinguishable from the user.

3 PI-HDAE

We describe security notions for the HDAE in this section. In the designed HDAE scheme, a sender in a PKI environment, while a receiver in an IBC environment. PI-HDAE is denoted by this kind of DAE as follows.

3.1 Syntax

A PI-HDAE scheme comprises five algorithms below:

Setup: Given system parameter 1k, the PKG obtains the params and a master private key s. In other algorithms, we neglect params due to they are public.

PKI-KG: A user belongs to the PKI setting elects a secret key sk and calculates its public key pk.

IBC-KE: A user in the IBC setting transmits its identity ID to the PKG who computes its private key SID and securely passes it to the user. Here, let the user’s public key be its identity ID.

Deniable-Authenticated-Encrypt(DAE): Given a message m, a sender’s secret key sks, public key pks, and a receiver’s identity IDr, the sender obtains a ciphertext σ.

Deniable-Authenticated-Decrypt(DAD): Given a ciphertext σ, a sender’s public key pks, a receiver’s identity IDr, and its private key SIDr, the receiver obtains a message m or a symbol ⊥.

If σ = DAE(m, sks, pks, IDr), then m = DAD(σ, pks, IDr,SIDr).

3.2 Security notions

We rewrite the notions [35] to meet our scheme. For confidentiality, the standard security concept, indistinguishability against adaptive chosen ciphertext attacks (IND-CCA2) is employed in our construction.

For IND-CCA2 security in a PI-HDAE scheme, it is assumed that this game below is between an adversary F with its challenger C.

“IND-CCA2” game (Game-I):

Setup. C performs Setup algorithm to get params, releases it to F and saves s. C also executes the PKI-KG algorithm to obtain a sender’s private/public key pair (sks*, pks*). Then it passes pks* to F.

Phase 1. F adaptively issues the queries below.

    Key extraction queries: F picks an identity ID. C obtains the private key SID by running an IBC-KE algorithm and transmits it to F.

    DAE queries: F selects a receiver’s identity IDr, and a message m. Then C executes DAE(m, sks*, pks*, IDr) and transmits the result σ to F.

    DAD queries: F selects a ciphertext σ, and a receiver’s identity IDr. C obtains SIDr by implementing key extraction algorithm. It then transmits σ = DAD(σ, pks*, IDr, SIDr) to F (the resulting ⊥ indicates σ is invalid).

Challenge. F determines when Phase 1 ends. F creates a challenge identity IDr* and two messages (m0, m1). In phase 1, it does not support to request a key extraction query on IDr*. C randomly picks b ∈ {0, 1}, computes σ* = DAE(mb, sks*, pks*, IDr) and outputs σ* to F.

Phase 2. F makes queries as in Phase 1 except it neither requests a key extraction query on identity IDr* nor executes a DAD query on (σ*, pks*, IDr*).

Guess. F returns b′, and it wins the game if b′ = b.

F’s advantage is

where Pr[b′ = b] expresses the probability.

Definition 1. A PI-HDAE scheme is IND-CCA2 secure if there is a probabilistic polynomial time (PPT) adversary F wins “IND-CCA2” game with a negligible advantage.

In the aforementioned definition, F is permitted to gain the sender’s private key SIDs [41]. Namely, the confidentiality is retained if the SIDs is compromised.

For deniable authentication, the security concept, deniable authentication against adaptive chosen message attacks (DA-CMA) is employed in our construction.

For DA-CMA in a PI-HDAE scheme, this game below is between F and C.

“DA-CMA” game (Game-II):

Setup. This is identical to Game-I.

Attack. This is identical to Game-I.

Forgery. F creates a pair (σ*,IDr*). F succeeds if the conditions below are satisfied:

    DAD(σ*,pks*,IDr*,SIDr) = m*.

    F has not issued a key extraction query on IDr*.

    F has not issued a DAE query on (m*, IDr*).

F’s advantage is defined as the probability that it will win.

Definition 2. A PI-HDAE scheme is DA-CMA secure if there is a PPT adversary F wins the “DA-CMA” game with a negligible advantage.

In the aforementioned definition, F does not issue a key extraction query on the identity IDr*. This is for deniability. In other words, the two parties involved communication are able to produce a transcript with indistinguishable probability.

3.3 Data Encapsulation Mechanism (DEM)

Two algorithms are included in a DEM.

    Enc: Given 1k, a message m, and a key K, this algorithm outputs a ciphertext c. It is denoted as c = Enc(K, m).

    Dec: Given a key K, and a ciphertext c, this algorithm outputs a message m or ⊥.

For a DEM, the security concept, indistinguishability against passive attackers (IND-PA) is employed in our construction. The game below is between A and C.

IND-PA game (Game-III):

Setup. A transmits two messages (m0, m1).

Challenge. C picks K, β ∈ {0, 1}, and outputs a challenge ciphertext c* = Enc(K, mβ) to A.

Guess. A returns β′, and it will win the game if β′ = β.

A’s advantage is

where Pr[β′ = β] expresses the probability.

Definition 3. A DEM is DA-CPA secure if there is a PPT adversary A wins “DA-CPA” game with a negligible advantage.

4 PI-HDATK

The security notions for heterogeneous deniable authenticated tag-KEM (HDATK) are given in this section. In the designed HDATK scheme, a sender belongs to a PKI setting, while a receiver belongs to an IBC setting. PI-HDATK is denoted by this kind of DATK scheme as follows.

4.1 Syntax

A PI-HDATK scheme comprises six algorithms below:

Setup: Given 1k, the PKG obtains the params and a master private key s. Due to params are public, we neglect them in other algorithms.

PKI-KG: A user in the PKI setting calculates a secret/public key pair (sk, pk).

IBC-KE: A user in the IBC setting transmits its identity ID to the PKG who computes its private key SID and securely transmits it to the user. Here, we assume that the user’s public key is its identity ID.

Sym: Given a sender’s secret key sks, public key pks, and a receiver’s identity IDr, the sender produces an encryption key K and state information ω.

Encap: Given a tag τ and the state information ω, the sender creates an encapsulation ϕ.

Decap: Given a sender’s public key pks, a receiver’s identity IDr, private key SIDr, a tag τ, and an encapsulation ϕ, the receiver outputs K or ⊥.

If (k, ω) = Sym(sks, pks, IDr) and ϕ = Encap(ω, τ), then K=Decap(ϕ,τ,pks,IDr,SIDr).

4.2 Security notions

The confidentiality and deniable authentication should be satisfied for the PI-HDATK scheme. For IND-CCA2 security in a PI-HDATK scheme, it is assumed that this game below is between F and C.

“IND-CCA2” game (Game-IV):

Setup. C performs Setup algorithm, delivers params to F and saves s. C also executes PKI-KG algorithm to obtain a sender’s private/public key pair (sks*, pks*). Then it delivers pks* to F.

Phase 1. F adaptively issues queries below.

    Key extraction queries: This is identical to Game-I.

    Symmetric key generation queries: F submits a receiver’s identity IDr to C. C then performs (K,ω)=Sym(sks*,pks*,IDr), stores the state information ω, and sends the key K to F.

    Encapsulation queries: F picks a tag τ. If ω is not matched, C outputs ⊥. If matched, C deletes the exist one and produces ϕ = Encap(ω, τ)

    Decapsulation queries: F picks an encapsulation ϕ, a receiver’s identity IDr, and a tag τ. C produces SIDr by performing key extraction algorithm. It outputs the result of Decap(ϕ, τ, pks*, IDr, SIDr) to F.

Challenge. F determines when Phase 1 is over. F then outputs a challenge identity IDr*. In phase 1, it does not support to request a key extraction query on IDr*. C executes (K1, ω*) = Sym(sks*,pks*,IDr*), picks b ∈ {0, 1}, K0KPI-HDATK, and passes Kb to F. when F obtains Kb, it will issue the identical queries as before. F then returns a tag τ*. C calculates a challenge encapsulation ϕ* = Encap(ω*, τ*) and outputs it to F.

Phase 2. F makes queries as in Phase 1 except it neither requests a key extraction query on identity IDr* nor executes a decapsulation query on (ϕ*, τ*, pks*, IDr*).

Guess. F returns b′, and it wins the game if b′ = b.

F’s advantage is

where Pr[b′ = b] expresses the probability.

Definition 4. A PI-HDATK scheme is IND-CCA2 secure if a PPT adversary F wins “IND-CCA2” game with negligible advantage.

In the above definition, it is allowed that F gets the sender’s secret key SIDs. Namely, the confidentiality is maintained if SIDs is compromised.

For deniable authentication, the security concept, deniable authentication against adaptive chosen message attacks (DA-CMA) is employed in our design.

For DA-CMA security in a PI-HDATK scheme, it is assumed that this game below is played between F with C.

“DA-CMA” game(Game-V):

Setup. This is identical to Game-III.

Attack. This is identical to Game-III.

Forgery. F creates an element (ϕ*, τ*, IDr*). F succeeds if the contexts below are met:

    DAD(σ*,pks*,IDr*) = m*.

    F has not issued a key extraction query on IDr*.

    F has not issued a DAE query on (m*, IDr*).

F’s advantage is defined as the probability that it will win.

Definition 5. A PI-HDATK scheme is DA-CMA secure if a PPT adversary F wins the “DA-CMA” game with a negligible advantage.

In the aforementioned definition, F does not issue a key extraction query on IDr*. This is for deniability. That is, the two parties involved communication are able to produce an indistinguishable transcript.

5 A hybrid PI-HDAE scheme

Fig 2 depicts a hybrid PI-HDAE scheme that constitutes a PI-HDATK and a DEM. In DEM part, the ciphertext is a tag. This construction provides simple description. Theorems 1 and 2 present the security consequences.

Construction of PI-HDAE from PI-HDATK and DEM.
Fig 2

Construction of PI-HDAE from PI-HDATK and DEM.

Theorem 1. Let a hybrid PI-HDAE scheme constitute a PI-HDATK and a DEM which are IND-CCA2 and IND-CPA secure, respectively, PI-HDAE is IND-CCA2 secure. to be specific, we receive

Proof: See Appendix 1.

Theorem 2. Let a PI-HDAE constitutes a PI-HDATK and a DEM. If PI-HDATK is DA-CMA secure, PI-HDAE is also DA-CMA secure. to be specific, we receive

Proof: Refer to Appendix 2.

6 A PI-HDATK scheme

There are six algorithms to describe our proposed scheme. Fig 3 shows the main description. In DEM part, a tag is the ciphertext. This construction provides simple description and realizes better universal security.

The main contribution of PI-HDATK.
Fig 3

The main contribution of PI-HDATK.

6.1 Basic knowledge

In this section, we provide bilinear pairings properties, decisonal bilinear Diffie-Hellman problem (DBDHP), and bilinear Diffie-Hellman problem (BDHP).

Let G1, G2 be an additive group and a multiplicative group, respectively. P is a generator of G1, and G1 as well as G2 have the same prime order q. A bilinear pairing is a map e: G1 × G1G2 with the following properties:

    Bilinearity: e(aP, bQ) = e(P, Q)ab for all P,QG1,a,bZq*.

    Non-degeneracy: There exists P, QG1 such that e(P, Q) ≠ 1.

    Computability: There is an efficient algorithm to compute e(P, Q) for all P, QG1

The modified Weil and Tate pairings are the admissible maps ([4248] offer more information). This scheme’s security depends on the difficulty of dealing with the flllowing problems.

Definition 1. Decisional Bilinear Diffie-Hellman Problem (DBDHP). In the light of bilinear pairings basic definition as above mentioned, DBDHP is to determine θ = e(P, P)abc given (P, aP, bP, cP) with a,b,c,θZq*.

Definition 2. Bilinear Diffie-Hellman Problem (BDHP). In the light of bilinear pairings basic definition as above mentioned, BDHP is to calculate e(P, P)abc given (P, aP, bP, cP) with a,b,cZq*.

6.2 Our scheme

Setup. Given G1, G2, P, and e as in Subsection A of Section VII. Let k be a security parameter (q ≥ 2k) and n be a a DEM’s key length. H1, H2, H3 are three cryptographic hash functions, where H1: {0, 1}* → G1, H2: {0, 1}* × G1 × G2 → {0, 1}n and H3:{0,1}*×G1×G2Zq*. The KGC randomly selects a master key sZq* and calculates Ppub = sP. The public params are (G1, G2, e, q, n, k, P, Ppub, H1, H2, H3) and a master private key is s.

PKI-KG. A user belongs to a PKI setting elecets xiZq* randomly as its secret key ski, and calculates pki = ski P as its public key. Here, i = s denotes the sender, and pks = xs P, sks = xs denotes the sender’s public/private key pair.

IBC-KE. A user belongs to an IBC setting gives its identity ID to the PKG. The PKG calculates its private key SKID = sQID(QID = H1(ID)) and securely transmits it to the user. Here, IDr denotes the receiver, and pkr = IDr skr=SIDr denote the receiver’s public and private key.

Sym. Given a sender’s private/public key pair (sks, pks), and a receiver’s identity IDr, the algorithm below is done.

    Pick rZq*.

    Compute t=e(Ppub,QIDr)r.

    Calculate K = H2(t, pks, IDr).

    Return K and ω = (r, t, sks, pks, IDr).

Encap. Given a tag τ and the state information ω, the algorithm below is done.

    Compute h = H3(τ, t, pks, IDr).

    Compute S = (hsks + r)Ppub.

    Compute W=e(S,QIDr).

    Compute V = hpks.

    Compute σ = (W, V).

Decap. Given a tag τ, an encapsulation σ, a sender’s public key pks, a receiver’s private key SIDr, identity IDr, the algorithm below is executed.

    Compute t=W/e(V,SIDr).

    Compute h = H3(τ, t, pks, IDr).

    If V = hpks, output K = H2(t, pks, IDr); if not, return the symbol ⊥.

The consistency of the designed HDATK scheme can be verified. Because W=e(S,QIDr), V = hpks, we can get

6.3 Security

Theorems 3 and 4 offer the security consequences for PI-HDATK.

Theorem 3. Under DBDH assumption, in ROM, F wins the IND-CCA2 game with a non-negligible advantage ϵdatk when issuing qHi queries to Hi (i = 1, 2, 3), qke key extraction queries, qgsk generation symmetric key queries, qke key encapsulation queries, and qkd key decapsulation queries in a time t, C resolves DBDH problem with probability

within t′ ≤ t + O(qgsk + qke + qkd)tp, in which tp is one paring computation.

Proof: Refer to Appendix 3.

Theorem 4. Under BDH assumption, in ROM, F has a non-negligible advantage ϵdatk10(qke+1)(qke+qH3)qH1/(2k-1) winning the DA-CMA game when issuing qHi queries to Hi (i = 1, 2, 3), qke key extraction queries, qgsk generation symmetric key queries, qke key encapsulation queries, and qkd key decapsulation queries in a time t, C resolves BDH problem in expected time t120686qH3qH12k/ϵdatk(2k-1).

Proof: Refer to Appendix 4.

7 Performance

We conduct a main computational cost comparison of the construction with existing schemes LZJ [35] and HDA-I of LHO [39] listed in Table 1. The point multiplication in G1, the exponentiation calculation in G2, the addition calculations in G1, and the pairing calculation in G2 are denoted by PM, EC, AD, and PC, respectively. We ignore XOR, and hash function since they are trivial. In all computational cost, the PC evaluation is the most time-consuming. From Table 1, it shows that the computation overhead of our scheme is less than that of LZJ [35], but more than that of the HDA-I of LHO [39]. It is noted that LZJ [35] is not a heterogeneous DAE scheme which is not catered for the LBS and HDA-I of LHO [39] cannot achieve confidentiality.

Table 1
Performance comparison.
SchemesComputational costSecurityHeterogeneity
PMBPADEPDA-CMAIND-CCA2
LZJ [35]4311×
HDA-I of LHO [39]3210×
Ours3301

An experiment is conducted on the PBC library with A pairing [49]. The A pairing is designed on an elliptic curve y2 = x3 + x mod p for some prime p ≡ 3 mod 4. As needed, we set the order of G1 is q and the library’s embedding degree to 2. Here, 80-bit, 112-bit, and 128-bit denotes three kinds of AES [50] key size security level, respectively. Table 2 shows the description for different security levels.

Table 2
Description for different security level.
Security levelSize of PSize of q
80-bit512160
112-bit1024224
128-bit1536256

We implement the experiment on an Intel Pentium(R) with 2,048 MB of RAM (2,007.04 MB available) and Dual-Core processor running at 2.69 GHz. On this machine, a PM takes 15.927 ms, and an AD requires 0.065ms employing an ECC with q of 160 bits. A PC and an EC take 26.68 ms and 3.126 ms, respectively. LZJ [35] takes 146.939 ms, HDA-I of LHO [39] takes 101.206 ms, and our scheme takes 130.947 ms. Fig 4 depicts the comparative computational cost for LZJ [35], HDA-I of LHO [39], and our scheme. From Fig 4, we can see that the implementation results are consistent with the theoretical analysis.

Computational cost comparison.
Fig 4

Computational cost comparison.

For the communication cost, LZJ [35], HDA-I of LHO [39], and our scheme are |m| + |G1| + |G2|. They possess the identical communication cost. |x| is the size of x. For 80-bit security level, |p| = 512bits, |G1| = 1024bits, |q| = 160bits. If the standard compression techniques are used, G1 can be reduced to 65bytes. G2 = 1024bits = 128bytes. Therefore, the communication cost of the three schemes is |m| + |G1| + |G2| = | m| + 65 + 128 = |m| + 193bytes. For 112-bit security level, |p| = 1024bits, |G1| = 2048bits, |q| = 224bits. Using the standard compression technique, G1 can be reduced to 129bytes. G2 = 2048bits = 256bytes. Therefore, the communication cost of the three schemes is |m| + |G1| + |G2| = |m| + 129 + 256 = |m| + 385bytes. For 128-bit security level, |p| = 1536bits, |G1| = 3072bits, |q| = 256bits. Using the standard compression technique, G1 can be reduced to 193bytes. G2 = 3072bits = 384bytes. Therefore, the communication cost of the three schemes is |m| + |G1| + |G2| = |m| + 193 + 384 = |m| + 577bytes. Fig 4 shows the communication cost at different security level. It shows that from Fig 5 the 80-bit security level is our best choice for the current computing condition.

Communication cost at different security level.
Fig 5

Communication cost at different security level.

8 Application

Zeng et al. [51] presented a deniable ring authentication for protecting the LBS privacy. In their scheme, the user’s identity is anonymous to the LBSP and he/she can deny that he/she sends the requested location information to LBSP. However, the entities are all in the same environment and the requested location information is sent in plaintext. Any adversary can monitor or intercept this sensitive information. Therefore, to better resolve this issue, utilize our designed HDAE scheme in LBS systems to render the transmitted message in ciphertext. The specific communication process is as follows:

A user in a PKI environment wants to request the location-based service m from the service provider (SP) in an identity-based environment. It first executes the PKI-KG algorithm to produce its private/public key pair (sks, pks) and executes DAE(m, sks, pks, IDr) to create a ciphertext σ. The user then passes the resulting σ to the SP. When the SP receive the LBS request, it first requests a private key SIDr from the PKG. Then it executes DAD(σ,pks,IDr,SIDr) to get the LBS request m. It cannot send the response of m to any third party, since the third party cannot ensure whether the LBS request m is from the user or the service provider, due to the fact that the service provider can generate the same LBS request m and ciphertext σ with indistinguishable probabilities.

9 Conclusion

In this paper, we designed a hybrid DAE scheme which comprises a PI-HDAE scheme and a DEM scheme. The entities are in a heterogeneous system where the sender belongs to the PKI environment, while the receiver belongs to the IBC environment. Our construction can achieve confidentiality and deniable authentication in a single logic step. We give a formal security proof in the ROM. Our performance results show that this construction is secure and efficient. Furthermore, we present an example and apply our design to LBS system for better service.

Appendix 1

Proof: Our proof strategy is shown below. The modified games Game0, Game1, Game2 are defined in [52, 53]. The games’ difference lies in how the environment replies F’s queries. F receives the challenge ciphretext σ* = (ϕ*, c*) that encrypts either m0 or m1 by its challenge oracle in the light of b utilizing symmetric key K*. K* is also used in the decapsulation ϕ* with pks and IDr chosen by F. In Gamei (i = 0, 1, 2), it is supposed that Si is the event δ′ = δ. F’s challenge oracle outputs δ and F returns δ′. F’s random oracle and F’s oracle determines the probability.

The lemma from [54] is employed as follows.

Lemma 1. Let E, E′, and F be events defined on a probability space such that Pr[E∧¬F] = Pr[E′∧¬F]. Then, we get |Pr[E] − Pr[E′]| ≤ Pr[F].

Game0: We execute key extraction algorithm to simulate adversary’s view in a real attack. Then we utilize the produced key to reply F’s queries. Thus, the adversary’s view is identical to it in a real attack. Hence, we find

Game1: In this game, we only alter how the DAD oracle replies F’s queries. After the calling of the challenge DAE oracle, (ϕ, c), pks and IDr are submitted to the DAD oracle. If pks=pks*, IDr=IDr*, ϕ = ϕ*, the DAD oracle does not employ the key K, and it utilizes the key K* to decapsulate c and passes the result to F.

This change does not affect F and so

Lemma 2. The running time of a ppt algorithm C1 is identical to that of F, so we have

Proof: The proof below gives how to design C1 of the PI-HDATK to be against the IND-CCA2 attack.

The game is between C1 and F as follows.

    Setup: C1 passes the param to F. Additionally, it also passes the sender’s public key pks to F.

    Phase 1: F submits a receiver’s identity IDj to C1. C1 executes a key extraction (KE) query to its own oracle and transmits the response to F. When F executes an encryption query on m, and IDj, C1 works as follows.

      Issue a symmetric key generation (SKG) query on IDj to gain K.

      Calculate c = DEM.Enc(K, m).

      Issue a key encapsulation (KES) query on c to gain ϕ.

      Return σ = (ϕ, c).

When F executes a key decryption (KD) query on σ = (ϕ, c), and IDj, C1 works as follows.

    Issue a KD query on (ϕ, c, IDj) to get K.

    If K = ⊥, abort.

    Calculate m = DEM.Dec(K, c) and output m.

    Challenge: F produces a challenge identity IDj and messages (m0, m1) with equal-lengths. C1 works as follows.

      Pass IDj to its challenger to gain Kβ for β ∈ {0, 1}.

      Elect δ ∈ {0, 1}.

      Compute c* = DEM.Enc(Kδ, mδ).

      Pass c* to its challenger to gain ϕ*.

      Return σ* = (ϕ*, c*) to F.

    Phase 2: F issues queries just like in phase 1 except for requesting a KE query on IDr and a KD query on σ* = (ϕ*, c*) to gain the corresponding message.

    Guess: F returns δ′. If δ′ = δ, C1 returns b′ = 1 which means Kb is a genuine key; or else it returns b′ = 0 which means Kb is a random key.

When Kb is a genuine key, F is performed just like it in Game1. It means

When Kb is a random key, F is executed just like it in Game2. It implies
Based on PI-HDATK’s security definition, we receive

Lemma 3. The running time of a ppt algorithm C2 is identical to that of F, so

Proof: The proof below gives how to design C2 of the PI-HDATK to be against the IND-PA attack. F is run just like the manner in game Game2. Before F calls its challenge DAE query, we perform the key extraction algorithm to answer F’s query. When F issues its challenge DAE query on identity IDr*, and two messages (m0, m1), we just transfer (m0, m1) to C2’s challenge encapsulation oracle to gain c*. We then issue a GSK query to have K* and issue a KES query to have ϕ*. We transmit (ϕ*, c*) to F and drop K*.

Pr[S2] is the probability that C2 pinpoints the challenge encapsulation oracle’s hidden bits due to that C2 returns whatever F returns.

Appendix 2

Proof: F attacks the PI-HDAE scheme with advantage AdvPI-HDAEDA-CMA(F). C attacks DA-CMA for PI-HDATK with advantage at least AdvPI-HDAEDA-CMA(F). We issue F’s queries below.

    Setup: C passes the param to F. Additionally, C also transmits pks to F.

    Attack: When F submits an IDj to C, C executes a KE query to its own oracles and passes the response to F. When F performs a DAE query on m, and IDj, C issues the SKG query, KES query and KD query just like C1 works in Lemma 2.

    Fogery: F outputs (m*,σ*,IDr*), where σ* = (ϕ*, c*). C returns (τ*,ϕ*,IDr*), where τ* = c*.

Visibly, this is a perfect proof. If F wins the DA-CMA game for PI-HDAE, C has the identical advantage to win the DA-CMA game for PI-HDATK.

Appendix 3

Proof: C gets an input (P, aP, bP, cP) of DBDH problem and purposes to decide if θ = e(P, P)abc. C is a challenger and performs F as a subroutine. C responds to F’s queries on H1, H2 and H3 and these answers are created randomly. C reserves lists L1, L2 and L3 to keep the answers. The assumptions are made as follows.

    Before F issues KE queries, GSK queries, KES queries and KD queries on identity ID, F will first inquire HID.

    A KES query’s encapsulation ciphertext will not be employed in a KD query.

    Setup: C transmits system parameters with Ppub = cP to F in which c is unknown to C. Additionally, C produces sender’s (sks, pks) and transmits public key pks to F.

    Phase 1: F issues queries as follows.

      H1 queries: C picks γ{1,2,,qH1}. F requests H1 queries on its choice identities. At the γ-th query, C replies by H1(IDγ) = bP. At the j-th query with jγ, C picks wjZq*, adds (IDj, wj) in the list L1 and responds H1(IDj) = wj P.

      H2, H3 queries: When F issues hash value queries, C checks whether the corresponding items are included in the lists. If yes, F will get the same answer; otherwise, F will get a random value. The value and query will be added in the list.

      Key extraction queries: When F issues key extraction queries on receiver’s identity IDj. If IDj = IDγ, C aborts. If not, L1 must comprise (IDj, wj) (it implies C has replied H1(IDj) = wj P.) The private key cH1(IDj) = wj cP = wj Ppub is calculated by C and transmitted to F.

      Generation symmetric key queries: F submits an IDj to C. C then executes (K, ω) = Sym(sks, pks, IDj) and passes K to F. C saves ω and overwrites the previous value.

      Key encapsulation queries: F creates τ. C checks if ω already exists. If not, C aborts. Or else, C just executes ϕ = Encap(ω, τ) and transmits the encapsulation ciphertext ϕ to F.

      Key decapsulation queries: F sends the receiver’s identity IDj, a tag τ, and an encapsulation ϕ. If IDj = IDγ, (ϕ, τ) is invalid. If F requests H3(t, τ, pks, IDj), where t=W/e(V,SIDj), C replies h that coincides with V = hpks, it aborts. From F’s perspective, σ = (W, V) is valid. The probability is at most 1/2k. If IDjIDγ, C gains SIDj by performing the key extraction query. It then passes the result of Decap(σ,τ,SIDj) to F.

    Challenge: F determines when phase 1 is over. It generates a receiver’s challenge identity IDr. If F has issued a key extraction query on IDγ, C aborts. If F does not pick IDr = IDγ as the target identity, it aborts too. C picks W* ∈ G2, sets V* = aP and computes t* = W*/θ (θ is DBDH problem’s candidate). Then C issues H2 query to look for K1 = H2(t*). C randomly picks K0, β ∈ (0, 1), and passes Kβ to F. F then passes τ* to C. Whereafter, C transmits σ* = (W*, V*) to F.

    Phase 2: F issues queries as in phase 1 except that it has no ability to issue a KE query on IDr and a KD query on (ϕ*, τ*) to gain the symmetric key.

    Guess: F outputs β′ for (Kβ, ω*) = Sym(sks, pks, IDr) and ϕ* = Encap(ω*, τ*) hold. If β′ = β, C outputs 1 shows θ = e(P, P)abc; If not, C outputs 0 shows θe(P, P)abc.

Now we calculate C’s successful probability. If one of the events below is satisfied, C will fail:

    E1 F does not pick IDγ as the receiver’s identity in challenge phase.

    E2 F has issued a KE query on IDγ.

    E3 C terminates in a KD query due to it refuses a valid encapsulation.

We show that Pr[¬E1] = 1/qH1, and Pr[E3] ≤ qkd/2k. Additionally, ¬E1 means ¬E2.

Because

p1 = Pr[β′ = β∣(Kβ, ω*) = Sym(pks, sks, IDr)] and ϕ*=Encap(ω*,τ*)=ϵ+12qkd2k

and

p0=Pr[β=i|θRG2]=12 for i = 0, 1,

We get

O(qgsk + qke + qkd) is C’s computation time that shows pairing computations in GSK queries, KE queries and KD queries.

Appendix 4

Proof: we have to let our design fit into the signature scheme described in [54], where the simulation step can be simulated in the absence of the sender’s private key (i.e., absence of the master private key). On this occasion, we need an approach to resolve the BDH problem.

First, we observe that the PI-HDATK scheme accords with the requested three-phase honest-verifier zero-knowledge identification protocol, where σ1 = t is the commitment, h = H3(τ, t, pks, IDr) is the hash value, and σ2 = W is the answer.

Second, a simulation step is shown and an approach of how to resolve the BDH problem is given. Given (P, aP, bP, cP) of BDH problem, C needs to compute h = e(P, P)abc. C performs F as a subroutine. F consults C to reply H1, H2, and H3 and C holds L1, L2, and L3 to preserve the resulting responses. The process below is depicted.

    Setup: C calculates params with Ppub = cP and passes them to F. Additionally, C also transmits pks = aP to F.

    Attack: F executes the following queries.

      H1 queries C picks γ{1,2,,qH1}. F requests H1 queries on its choice identities. At the γ-th query, C replies by H1(IDγ) = bP. At the j-th query with jγ, C picks wjZq*, inserts (IDj, wj) in the list L1 and responds H1(IDj) = wj P.

      H2, H3 queries, KE queries, GSK queries, KES queries, and KD queries are identical to them in Theorem 3.

    Fogery: F outputs a triple (σ*, τ*, IDγ), where σ* = (W*, V*). We coalesce IDγ and τ* into a “generalized” forged tag (IDγ, τ*) to hide the identity-based aspect of the DA-CMA attack, and simulate the setting of an identity-less adaptive-CMA existential forgery. If F is an efficient forger, then we have the capability to constitute a Las Vegas machine F that outputs ((IDγ, τ*), h*, σ*) and ((IDγ,τ*),h¯*,σ¯*) with h*h¯* and the same commitment t*. To resolve the BDH problem based on the machine F, we constitute a machine C as follows.

    C performs F to gain two distinct signatures ((IDγ, τ*), h*, σ*) and ((IDγ,τ*),h¯*,σ¯*).

    C computes e(P, P)abc as (W*/W¯*)1/(h*-h¯*).

From the forking lemma [54] and the lemma on relationship between given-identity and chosen-identity attack [55], if F succeeds with probability ϵdatk10(qke+1)(qke+qH3)qH1/(2k-1)) in time t, then C resolves the BDH problem in expected time t120686qH3qH12k/ϵdatk(2k-1).

Acknowledgements

The authors thank the anonymous reviewers and the Editor for the constructive comments and generous feedback.

References

GSun, VChang, MRamachandran, ZSun, GLi, HYu, et al Efficient location privacy algorithm for Internet of Things (IoT) services and applications. Journal of Network and Computer Applications. 2017; 89: 313. 10.1016/j.jnca.2016.10.011

TPeng, QLiu, DMeng, GWang. Collaborative trajectory privacy preserving scheme in location-based services. Information Sciences. 2017; 387: 165179. 10.1016/j.ins.2016.08.010

SYoon, JKim, DJConnolly. Understanding motivations and acceptance of location-based services. International Journal of Hospitality & Tourism Administration. 2018; 19(2): 187209. 10.1080/15256480.2017.1305316

SZhang, GWang, MABhuiyan, QLiu. A dual privacy preserving scheme in continuous location-based services. IEEE Internet of Things Journal. 2018; 5(5): 41914200. 10.1109/JIOT.2018.2842470

CMa, ZYan, CWChen. SSPA-LBS: Scalable And Social-Friendly Privacy-Aware Location-Based Services. IEEE Transactions on Multimedia. 2019; 21(8): 21462156. 10.1109/TMM.2019.2892300

MAtaei, ADegbelo, CKray, VSantos. Complying with Privacy Legislation: From Legal Text to Implementation of Privacy-Aware Location-Based Services. ISPRS international journal of geo-information. 2018; 7(11). 10.3390/ijgi7110442

IMemon, IHussain, RAkhtar, GChen. Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications. 2015; 84(2): 14871508. 10.1007/s11277-015-2699-1

QXie, LWang. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data. Sensors. 2016; 16: 1993 10.3390/s16121993

GSun, DLiao, HLi, VChang. L2P2: A location-label based approach for privacy preserving in LBS. Future Generation Computer Systems. 2017; 375384. 10.1016/j.future.2016.08.023

10 

PAsuquo, HCruickshank, JMorley, CPOgah, ALei, WHathal, et al Security and privacy in location-based services for vehicular and mobile communications: an overview, challenges, and countermeasures. IEEE Internet of Things Journal. 2018; 5(6): 47784802. 10.1109/JIOT.2018.2820039

11 

YZhang, CXu, HLi, KYang, JZhou, XLin. HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems. IEEE Transactions on Industrial Informatics. 2018; 14(9): 41014112. 10.1109/TII.2018.2832251

12 

JZhou, ZCao, ZQin, XDong, KRen. LPPA: Lightweight Privacy-preserving Authentication from Efficient Multi-key Secure Outsourced Computation for Location-based Services in VANETs. IEEE Transactions on Information Forensics and Security. 2020; 420434. 10.1109/TIFS.2019.2923156

13 

XZhu, EAyday, RVitenberg. A privacy-preserving framework for outsourcing location-based services to the cloud. IEEE Transactions on Dependable and Secure Computing. 2019; 11. 10.1109/TDSC.2019.2892150

14 

HWang, ZZhang, TTaleb. Special issue on security and privacy of IoT. World Wide Web. 2018; 21(1): 16. 10.1007/s11280-017-0490-9

15 

HWang, YWang, TTaleb, XJiang. Special issue on security and privacy in network computing. World Wide Web. 2020; 23(2): 951957. 10.1007/s11280-019-00704-x

16 

FZhang, YWang, SLiu, HWang. Decision-based evasion attacks on tree ensemble classifiers. World Wide Web. 2020; 121.

17 

YAumann, MRabin. Authentication, enhanced security and error correcting codes. Proc. Cryptology—CRYPTO’98, 1998; 299303.

18 

WWu, FLi. An Efficient Identity-Based Deniable Authenticated Encryption Scheme. Ksii Transactions on Internet and Information Systems. 2015; 9(5): 19041919.

19 

RCramer, VShoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing. 2003; 33(1): 167226. 10.1137/S0097539702403773

20 

MAbe, RGennaro, KKurosawa. Tag-KEM/DEM: A new framework for hybrid encryption. Journal of Cryptology. 2008; 21(1): 97130. 10.1007/s00145-007-9010-x

21 

Choi KY, Cho J, Hwang JY, Kwon T. Constructing efficient PAKE protocols from identity-based KEM/DEM. Proc. Information Security Applications—16th International Workshop, WISA 2015. 2015; 411–422.

22 

Emura K, Kanaoka A, Ohta S, Takahashi T. A KEM/DEM-based construction for secure and anonymous communication. Proc. 39th IEEE Annual Computer Software and Applications Conference, COMPSAC 2015. 2015; 2: 1–5.

23 

JXu, QWen, WLi, ZJin. Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. IEEE transactions on parallel and distributed systems. 2015; 27(1):119129. 10.1109/TPDS.2015.2392752

24 

Bansal TK, Chang D, Sanadhya SK. Sponge based CCA2 secure asymmetric encryption for arbitrary length message. Proc. Information Security and Privacy—20th Australasian Conference, ACISP 2015. 2015; 93–106.

25 

YIshida, JShikata, YWatanabe. CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. International Journal of Applied Cryptography. 2017; 3(3): 288311. 10.1504/IJACT.2017.086229

26 

Wu X, Han Y, Zhang M, Zhu S. Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data. Proc. Information Security and Cryptology-13th International Conference, Inscrypt 2017. 2017; 211–222.

27 

Giacon F, Kiltz E, Poettering B. Hybrid encryption in a multi-user setting, revisited. Proc. Public-Key Cryptography—PKC 2018—21st IACR International Conference on Practice and Theory of Public-Key Cryptography. 2018; 159–189.

28 

Ge A, Wei P. Identity-based broadcast encryption with efficient revocation. Proc. Public-Key Cryptography—PKC 2019—22nd IACR International Conference on Practice and Theory of Public-Key Cryptography. 2019; 405–435.

29 

Sakai Y, Hanaoka G. A Remark on an Identity-Based Encryption Scheme with Non-interactive Opening. Proc. 2018 International Symposium on Information Theory and its Applications (ISITA). 2018; 703–706.

30 

JBaek, WSusilo, KSalah. JSHa, EDamiani, IYou. Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment. Proc. Cyber Security: Principles, Techniques, and Applications. 2019; 122.

31 

FLi, DZhong, TTakagi. Efficient deniably authenticated encryption and its application to e-mail. IEEE Transactions on Information Forensics and Security. 2016; 11(11): 24772486. 10.1109/TIFS.2016.2585086

32 

CJin, GChen, CYu, JYZhao. Deniable authenticated encryption for e-mail applications. International Journal of Computers and Applications. 2018; 110.

33 

Rasmussen K, Gasti P. Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications. Proc. 16th Annual Conference on Privacy, Security and Trust, PST 2018. 2018; 1–10.

34 

WHuang, YLiao, SZhou, HChen. An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection. IEEE Access. 2019; 7:4345343461. 10.1109/ACCESS.2019.2907250

35 

FLi, ZZheng, CJin. Identity-based deniable authenticated encryption and its application to e-mail system. Telecommunication Systems. 2016; 62(4): 625639. 10.1007/s11235-015-0099-1

36 

Jin C, Zhao J. Efficient and short identity-based deniable authenticated encryption. Proc. Cloud Computing and Security—Third International Conference, ICCCS 2017. 2017; 244–255.

37 

EAhene, CJin, FLi. Certificateless deniably authenticated encryption and its application to e-voting system. Telecommunication Systems. 2019; 70(3): 41743. 10.1007/s11235-018-0496-3

38 

GChen, JZhao, YJin, QZhu, CJin, JShan, et al Certificateless Deniable Authenticated Encryption for Location-Based Privacy Protection. IEEE Access. 2019; 7: 101704101717. 10.1109/ACCESS.2019.2931056

39 

FLi, JHong, AAOmala. Practical deniable authentication for pervasive computing environment. Wireless Networks. 2018; 24(1): 139149. 10.1007/s11276-016-1317-9

40 

CJin, GChen, CYu, JZhao, YJin, JShan. Heterogeneous deniable authentication and its application to e-voting systems. Journal of information security applications. 2019; 47: 104111. 10.1016/j.jisa.2019.04.009

41 

An JH, Dodis Y, Rabin T. On the security of joint signature and encryption. Proc. Cryptology—EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques. 2002; 83–107.

42 

DBoneh, MFranklin. Identity-based encryption from the weil pairing. SIAM Journal on Computing. 2003; 32(3): 586615. 10.1137/S0097539701398521

43 

YZhang, CXu, XLin, XSShen. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors. IEEE Transactions on Cloud Computing. 2019; 11. 10.1109/TCC.2019.2908400

44 

YMiao, XLiu, KRChoo, RHDeng, JLi, HLi, et al Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. IEEE Transactions on Dependable and Secure Computing. 2019; 11.

45 

XZhang, HWang, CXu. Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Information Sciences. 2019; 472: 223234. 10.1016/j.ins.2018.09.013

46 

EKabir, AMahmood, HWang, AKMustafa. Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing. IEEE Transactions on Cloud Computing, 2015; 11.

47 

YWang, YShen, HWang, JCao, XJiang. Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications. IEEE Transactions on Big Data. 2016; 4(3): 418431. 10.1109/TBDATA.2016.2599928

48 

KCheng, LWang, YShen, HWang, YWang, XJiang, et al Secure k-nn query on encrypted cloud data with multiple keys. IEEE Transactions on Big Data. 2017; 11. 10.1109/TBDATA.2017.2707552

50 

JDaemen, VRijmen. The design of Rijndael: AES-The Advanced Encryption Standard. Springer Science & Business Media. 2013.

51 

Zeng S, Tan S, Chen Y, He M, Xia M, Li X. Privacy-preserving location-based service based on deniable authentication. Proc. 9th International Conference on Utility and Cloud Computing (UCC). 2016; 276–281.

52 

YZhang, CXu, JNi, HLi, XShen. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storag. IEEE Transactions on Cloud Computing. 2019; 11. 10.1109/TCC.2019.2908400

53 

YZhang, CXu, XLiang, HLi, YMu, XZhang. Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Transactions on Information Forensics and Security. 2016; 12(3): 676688. 10.1109/TIFS.2016.2631951

54 

DPointcheval, JStern. Security arguments for digital signatures and blind signatures. Journal of Cryptology. 2000; 13(3): 361396. 10.1007/s001450010003

55 

JCCha, JHCheon. An identity-based signature from gap Diffie-Hellman groups. Proc. Public Key Cryptography—PKC 2003. 2003; 1830.