Abstract

Deniable authenticated encryption (DAE) is a cryptographic primitive that supports data confidentiality with deniable authentication in an efficient manner. The DAE plays a significant role in location-based service systems for privacy protection. In this paper, we construct a certificateless DAE (CLDAE) scheme. The CLDAE is based on certificateless cryptosystems (CLCs), which avoids the need to manage public key certificates in public key infrastructure (PKI)-based cryptosystems and key escrow problems in identity-based cryptosystems (IBCs). Our design utilizes hybrid methods: tag-key encapsulation mechanism (TKEM) and data encapsulation mechanism (DEM). This technique is more suitable for location-based applications. We show how to construct a CLDAE scheme utilizing a certificateless deniable authenticated tag-KEM (CLDATK) and a DEM. We also design a CLDATK scheme and provide formal security proof using the random oracle model (ROM). We conduct a comprehensive performance analysis, which shows that CLDAE is highly efficient in terms of communication overhead. We also provide an application of the CLDAE for a location-based service (LBS) system.

Highlights

  • With the rapid expansion in mobile social networks, smart devices, and localization techniques, location-based service (LBS) have become an indispensable part of daily life duo to the fact that they provide users with various types of services related to location [1]–[3].To use an location-based services (LBSs), users submit their location-based requirements (a nearest point of interest (POI), such as the nearest hospital, gas station or movie theatre) to a location-based service provider (LBSP); the LBSP returns the location response to the users

  • On the basis of this, the LBSP can deduce from private information about the user, such as commute routes, daily activity trajectories, and social connections

  • When a user requests an LBS for hospital, the LBSP could predict that the user may have a health problem

Read more

Summary

INTRODUCTION

With the rapid expansion in mobile social networks, smart devices, and localization techniques, location-based service (LBS) have become an indispensable part of daily life duo to the fact that they provide users with various types of services related to location [1]–[3]. Li et al [33] presented a DAE scheme that simultaneously achieves confidentiality, integrity and deniable authentication Their scheme works in a PKI environment; it has the public key management problem. To solve this problem, Li et al [34] constructed a tag/KEM-DEM hybrid DAE scheme and showed it to be VOLUME 7, 2019 highly efficient through a comprehensive analysis. Li et al [34] constructed a tag/KEM-DEM hybrid DAE scheme and showed it to be VOLUME 7, 2019 highly efficient through a comprehensive analysis Their scheme has the key escrow problem, which means that the PKG is capable of knowing all the entities’ private keys.

SYNTAX A CLDAE scheme comprises the following six algorithms: Setup
SYNTAX
SECURITY NOTIONS
A CLDATK SCHEME
OUR SCHEME
VIII. CONCLUSION
PROOF OF THEOREM 2
PROOF OF THEOREM 3

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.