Aitac: an identity-based traceable anonymous communication model
- PDF / 1,275,511 Bytes
- 10 Pages / 595.276 x 790.866 pts Page_size
- 47 Downloads / 192 Views
ORIGINAL RESEARCH
Aitac: an identity‑based traceable anonymous communication model Fengyin Li1 · Zhongxing Liu1 · Yilei Wang1 · Nan Wu2 · Jiguo Yu3,4 · Chongzhi Gao5 · Huiyu Zhou6 Received: 15 May 2020 / Accepted: 6 October 2020 © Springer-Verlag GmbH Germany, part of Springer Nature 2020
Abstract In the big data background, data privacy becomes more and more important when data leakage and other security events occur more frequently. As one of the key means of privacy protection, anonymous communication attracts large attention. Aiming at the problems such as low efficiency of message forwarding, high communication delay and abusing of anonymity, this paper presents an identity-based traceable anonymous communication model by adding a preprocessing phase, modifying the ciphertext structure and increasing the controllability of anonymity. Firstly, a new identity-based signature algorithm is proposed, and its security is proved via existential unforgeability against chosen-message attacks (EU-CMA). The signature algorithm is further applied to the anonymous communication model to implement the controllability of revocable anonymity. Secondly, by adding a preprocessing Setup phase, the operations of identifications distribution and user authentication are launched before the anonymous communication phase starts, and this practice significantly improves the efficiency of the anonymous communication model. Finally, by adding the hash value of the message and the user identification as the message authentication code, we design a new ciphertext structure, which can efficiently guarantee the integrity of the ciphertext. Performance analysis and simulation results show that the proposed anonymous communication model has high message forwarding efficiency and better security and controllability of anonymity. Keywords Identity-based encryption · Bilinear map · Privacy protection · Identifications · Anonymous communications
1 Introduction With the development of network technology and increasing big data applications, data privacy attracts more and more attention (Li et al. 2009; Jayaraman and Panneerselvam 2020; Silva et al. 2020; Wang et al. 2020). As one of the * Chongzhi Gao [email protected] 1
School of Computer Science, Qufu Normal University, Rizhao 276826, China
2
Science and Technology Department, Qufu Normal University, Qufu 273165, China
3
School of Computer Science and Technology, Qilu University of Technology (Shandong Academy of Sciences), Jinan 250353, China
4
Shandong Computer Science Center, National Supercomputer Center in Jinan, Jinan 250014, China
5
Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou 510006, China
6
School of Informatics, University of Leicester, Leicester LE1 7RH, UK
key means of privacy protection, anonymous communication has become a major research focus. Anonymous communication technology originated from the MIX-net mechanism (Chaum 1981), which confuses messages through a single or multiple MIX nodes to hide the user’s iden
Data Loading...