An Attribute-Based End-to-End Policy-Controlled Signcryption Scheme for Secure Group Chat Communication
Abstract
:1. Introduction
- Lightweight: We propose a lightweight signcryption scheme for communication. The computational cost for the sender in the group chat is constant, and the sender only requires three power operations and one linear mapping operation during the signcryption process. Although the computational cost for the receiver still increases with the number of attributes, it is lower than that of existing schemes. In the experiment, end devices with varying computing resources were used for testing, and the computing times for both the signcryption and un-signcryption operations were within a reasonable range.
- Strong expressive capability: The signcryption scheme for communication (PCE-EtoE) that we propose demonstrates strong expressive capability. Compared with the monotone Boolean function access structure in PCEA [13], the PCE-EtoE scheme uses LSSS to design an access structure with strong expressive power, capable of describing complex access policies including “and”, “or” and other predicates.
- Mitigate message overload: Our proposed PCE-EtoE scheme effectively prevents users from receiving unnecessary information that is irrelevant to their needs. In PCE-EtoE, the sender in group communication can construct a complex and fine-grained access policy, ensuring that only receivers conforming to the policy can receive the group chat information.This scheme not only ensures controllable message flow but also enhances the efficiency of the messages received, thereby avoiding message overload and preventing users from missing key information.
- Security: In the defined security model, PCE-EtoE ensures message confidentiality through indiscernibility under chosen plaintext attacks (IND-CPA). Additionally, the scheme employs double encryption technology (encryption + signcryption), which prevents the communication operator from decrypting the second-level ciphertext, thereby ensuring that the communication operator cannot steal the content of the group chat communications.
2. Related Work
3. Preliminaries
3.1. Symmetric Bilinear Mapping
- Bilinearity: ,: ;
- Non-degeneracy: : ;
- Computability: ;.
3.2. Decisional Bilinear Diffie–Hellman Assumption
- Given cyclic groups and of order p as prime numbers.
- Randomly select the generator and the random numbers .
- and to send A.
4. Security Model
- (1)
- Initialization: The challenger runs the Setup, KCGSKeyGen, and UserKeyGen algorithms, generating , , , and system parameters , and provides and to the attacker. The attacker chooses a set of access policies to send to the challenger.
- (2)
- Phase 1: The attacker can request to query the credential of any ciphertext not utilized in the un-signcryption challenge.
- (3)
- Challenge: The attacker submits two randomly chosen messages, and , of equal length to the challenger. The challenger randomly selects and performs the signcryption operation on the message according to the access policy submitted by the attacker.
- (4)
- Phase 2: The same as phase 1,the attacker can request to query the credential of any ciphertext not utilized in the un-signcryption challenge.
- (5)
- Guess: The attacker outputs the guess . Thus, the advantage of the attacker in this game is defined as .
5. The Proposed PCE-EtoE Scheme
- Sender: Complete the transmission of messages in the group chat. Control the specific flow of information in the group chat to ensure that the flow of dissemination of group chat messages is effectively managed.
- Receiver: Only receive relevant and valid information in the group chat.
- Key and Credential Generation Server (KCGS): KCGS is responsible for generating public parameters and creating credentials and keys for users (sender and receiver). KCGS is a semi-honest server, which may tamper with part of the content in the credential.
- Communication Operator’s Server (COS): It is responsible for generating the elliptic curve parameters, completing the key agreement for the secondary encryption key between the users and COS, and forwarding the ciphertext information.
5.1. Overview
- (1)
- Setup: Public Parameter Generation (Setup): The setup is aimed at initializing the system. Setup is a probabilistic polynomial time (PPT) algorithm where the security parameter l is input, and the public parameter is the output.
- (2)
- Key and Credential Generation:(a) KCGS Key Generation (KCGSKeyGen): KCGSKeyGen is aimed at constructing the KCGS’s public and private keys. KCGSKeyGen is a PPT algorithm that outputs public key of KCGS and private key of KCGS after inputting public parameters.(b) User Credential Generator (CreGen): CreGen is aimed at completing the construction of a user’s credential. CreGen is a PPT algorithm that outputs user’s credential after inputting public parameters, user’s attributes S, and public key of KCGS .(c) User Key Generation (UserKeyGen): UserKeyGen is aimed at constructing the user’s public and private keys. UserKeyGen is a PPT algorithm that outputs public key of user and private key of user after inputting public parameters and public key of KCGS .
- (3)
- Key Agreement: Key agreement is aimed at completing the secure negotiation of a shared key between the sender and receiver. Input the user’s public key for secondary encryption, , and finally, output the shared key of the user and the COS ( or ).
- (4)
- Message Sending (MesSen): Message Sending is aimed at completing the secure transmission of messages. Input access policy , group chat message M, public key of KCGS , private key of user , shared key, and finally, output secondary ciphertexts .
- (5)
- Message Forwarding (MesForw): Message Forwarding is aimed at accomplishing the secure forwarding of messages. Input secondary ciphertexts , the set of shared key ( is the number of people in the group chat), and finally, output timestamp and secondary forwarding ciphertext .
- (6)
- Message Receiving (MesRec): Message Receiving is aimed at completing the secure receiving of messages. Input the secondary forwarding ciphertext for the specified receiver , the receiver’s certificate , the public key of the sender , and output group chat message M or ⊥.
5.2. Setup
5.2.1. Public Parameter Generation
5.2.2. Selection of Hash Functions
Algorithm 1 Setup |
Input: l Output:
|
5.3. Key and Credential Generation
5.3.1. KCGSKeyGen
5.3.2. CreGen
5.3.3. CreVer
5.3.4. UserKeyGen
Algorithm 2 Key and Credential Generation |
Input: ,S Output: , , /⊥, ,
|
5.4. Key Agreement
- (1)
- computes the public key according to the published elliptic curve and sends to the Communication Operator Server (COS).
- (2)
- After receiving , the COS computes and , and then sends to . Here, is the shared key between and COS.
- (3)
- After obtains , it computes the shared key .The shared key obtained after key agreement is used as the second-level encryption key in secure group chat communication. After establishing the shared keys between the COS and all users in the group chat, all the shared keys and their corresponding user identities are stored in the shared key table.
5.5. Message Sending (MesSen)
5.5.1. LSSS Generation
5.5.2. Attribute Code Generation
5.5.3. Signcryption
5.5.4. Secondary Encryption
Algorithm 3 Message Sending |
Input: Output:
|
5.6. Message Forwarding (MesForw)
Algorithm 4 COS Forwarding |
Input: , Output: ,
|
5.7. Message Receiving (MesRece)
5.7.1. Secondary Decryption
5.7.2. Un-Signcrypt
Algorithm 5 Message Receiving |
Input: , , Output:
|
6. Security and Functional Analysis
6.1. Correctness
6.2. Confidentiality
- (1)
- Initialization: Simulator first sets , randomly selects , sets and in , and sets and and in . Finally, the two public keys and system parameters are provided to attacker , and the list H is initialized.
- (2)
- Phase 1: Attacker can query simulator for the private key, and the simulator queries the list , returns the result if it exists, selects the random number F if it does not exist, and updates the list . An attacker can submit a user set S to simulator to query for any credential that is not used to challenge the ciphertext of un-signcryption. For the credential query submitted by , the simulator selects . For each attribute , the simulator queries the list if it contains the attribute; if it does not, it randomly selects and adds the element to the list and updates it. Choose random numbers ; let ; randomly choose ; let ; and calculate . Finally, simulator sends the un-signcryption’s credential to .
- (3)
- Challenge: Attacker submits two randomly chosen messages and of the same length to simulator , where and have the same POL. The simulator first randomly selects , and then sets , randomly selects a column vector , where . Calculate , where exists. Compute . Let and then perform signcryption, choose at random, compute , and then compute as follows:Finally, the simulator sends the ciphertext to attacker .
- (4)
- Phase 2: Similar to phase 1, attacker can submit a user attribute set S to the simulator to query any credential not used for the un-signcryption challenge ciphertext.
- (5)
- Guess: Attacker outputs a guess of . If , and then simulator outputs 0, indicating that the guess is . Otherwise, simulator outputs 1, indicating that the guess is . If , then input and , and compute
6.3. Resist Communication Operator Theft
6.4. Mitigate Message Overload
7. Performance Evaluation
7.1. Theoretical Performance
7.2. Actual Performance
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Siyal, R.; Long, J.; Asim, M.; Ahmad, N.; Fathi, H.; Alshinwan, M. Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation. Mathematics 2024, 12, 1956. [Google Scholar] [CrossRef]
- Alali, A.S.; Ali, R.; Jamil, M.K.; Ali, J.; Gulraiz. Dynamic S-Box Construction Using Mordell Elliptic Curves over Galois Field and Its Applications in Image Encryption. Mathematics 2024, 12, 587. [Google Scholar] [CrossRef]
- Church, K.; De Oliveira, R. What’s up with WhatsApp? Comparing mobile instant messaging behaviors with traditional SMS. In Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, Munich, Germany, 27–30 August 2013; pp. 352–361. [Google Scholar]
- Sutikno, T.; Handayani, L.; Stiawan, D.; Riyadi, M.A.; Subroto, I.M.I. WhatsApp, viber and telegram: Which is the best for instant messaging? Int. J. Electr. Comput. Eng. 2016, 6, 909–914. [Google Scholar] [CrossRef]
- Ou, C.; Davison, R. Interactive or interruptive? Instant messaging at work. Decis. Support Syst. 2011, 52, 61–72. [Google Scholar] [CrossRef]
- Wang, Z.; Ma, Z.; Luo, S.; Gao, H. Enhanced Instant Message Security and Privacy Protection Scheme for Mobile Social Network Systems. IEEE Access 2018, 6, 13706–13715. [Google Scholar] [CrossRef]
- Afzal, A.; Hussain, M.; Saleem, S.; Shahzad, M.; Ho, A.; Jung, K. Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App. Appl. Sci. 2021, 11, 7789. [Google Scholar] [CrossRef]
- Noriega, K.E.O.; Segura, J.E.G.; de los Santos, A.C.M. Security in the use of instant messaging applications for internal communication. SCIÉNDO 2022, 25, 219–227. [Google Scholar] [CrossRef]
- Zhang, L.; Pan, G. Research on the Secure Communication Model of Instant Messaging. In Proceedings of the 6th International Conference on Computer Science and Application Engineering, Virtual, China, 21–23 October 2022; pp. 1–6. [Google Scholar]
- Schillinger, F.; Schindelhauer, C. End-to-End Encryption Schemes for Online Social Networks. In Security, Privacy, and Anonymity in Computation, Communication, and Storage; Springer: Cham, Switzerland, 2019; pp. 133–146. [Google Scholar] [CrossRef]
- Basem, O.; Ullah, A.; Hassen, H.R. Stick: An End-to-End Encryption Protocol Tailored for Social Network Platforms. IEEE Trans. Dependable Secur. Comput. 2023, 20, 1258–1269. [Google Scholar] [CrossRef]
- Iduh, B.N. WhatsApp Network Group Chat Analysis Using Python Programming. Int. J. Latest Technol. Eng. Manag. Appl. Sci. (IJLTEMAS) 2020, 9, 1–5. [Google Scholar]
- Thorncharoensri, P.; Susilo, W.; Mu, Y. Policy controlled system with anonymity. Theor. Comput. Sci. 2018, 745, 87–113. [Google Scholar] [CrossRef]
- Liang, X.; Tang, Z.; Zhang, X.; Yu, M.; Zhang, X. Robust hashing with local tangent space alignment for image copy detection. IEEE Trans. Dependable Secur. Comput. 2023, 21, 2448–2460. [Google Scholar] [CrossRef]
- Liang, X.; Tang, Z.; Huang, Z.; Zhang, X.; Zhang, S. Efficient hashing method using 2D-2D PCA for image copy detection. IEEE Trans. Knowl. Data Eng. 2021, 35, 3765–3778. [Google Scholar] [CrossRef]
- Huang, Z.; Tang, Z.; Zhang, X.; Ruan, L.; Zhang, X. Perceptual image hashing with locality preserving projection for copy detection. IEEE Trans. Dependable Secur. Comput. 2021, 20, 463–477. [Google Scholar] [CrossRef]
- Yu, M.; Tang, Z.; Zhang, X.; Zhong, B.; Zhang, X. Perceptual hashing with complementary color wavelet transform and compressed sensing for reduced-reference image quality assessment. IEEE Trans. Circuits Syst. Video Technol. 2022, 32, 7559–7574. [Google Scholar] [CrossRef]
- Tang, Z.; Zhang, X.; Li, X.; Zhang, S. Robust image hashing with ring partition and invariant vector distance. IEEE Trans. Inf. Forensics Secur. 2015, 11, 200–214. [Google Scholar] [CrossRef]
- Hong, H.; Xia, Y.; Sun, Z.; Liu, X. Provably secure attribute based signcryption with delegated computation and efficient key updating. KSII Trans. Internet Inf. Syst. 2017, 11, 2646. [Google Scholar]
- Rao, Y.S.; Dutta, R. Efficient attribute-based signature and signcryption realizing expressive access structures. Int. J. Inf. Secur. 2016, 15, 81–109. [Google Scholar] [CrossRef]
- Yu, G.; Cao, Z. Attribute-based signcryption with hybrid access policy. Peer- Netw. Appl. 2017, 10, 253–261. [Google Scholar] [CrossRef]
- Xu, Q.; Tan, C.; Fan, Z.; Zhu, W.; Xiao, Y.; Cheng, F. Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption. IEEE Access 2018, 6, 34051–34074. [Google Scholar] [CrossRef]
- Zhao, Y.; Ruan, A.; Dan, G.; Huang, J.; Ding, Y. Efficient multi-authority attribute-based signcryption with constant-size ciphertext. In Proceedings of the 2021 IEEE Conference on Dependable and Secure Computing (DSC), Aizuwakamatsu, Fukushima, 30 January–2 February 2021; pp. 1–8. [Google Scholar]
- Wang, C.; Huang, J. Attribute-based signcryption with ciphertext-policy and claim-predicate mechanism. In Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security, Sanya, China, 3–4 December 2011; pp. 905–909. [Google Scholar]
- Cohn-Gordon, K.; Cremers, C.; Garratt, L.; Millican, J.; Milner, K. On ends-to-ends encryption: Asynchronous group messaging with strong security guarantees. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 1802–1819. [Google Scholar]
- Gupta, S.; Sacchetti, T.; Crispo, B. End-to-end encryption for securing communications in industry 4.0. In Proceedings of the 2022 4th IEEE Middle East and North Africa COMMunications Conference (MENACOMM), Amman, Jordan, 6–8 December 2022; pp. 153–158. [Google Scholar]
- Vidya Sagar, P.; Dhinesh, K.; Jayakumar, M.; Hemamalini, D. Hybrid Encryption through End to End in Messaging Service Applications. In Proceedings of the 2023 International Conference on Inventive Computation Technologies (ICICT), Lalitpur, Nepal, 26–28 April 2023; pp. 1139–1146. [Google Scholar]
- Lewko, A.; Waters, B. Decentralizing attribute-based encryption. In Proceedings of the Annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, 15–19 May 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 568–588. [Google Scholar]
Scheme | Access Structure | Functionality | ||||
---|---|---|---|---|---|---|
CM | LC | CC | NR | RO | ||
[24] | Access Tree | × | × | × | ✓ | × |
[19] | MBF | × | × | × | × | × |
[20] | LSSS | ✓ | × | × | × | × |
[21] | MBF and Threshold | × | × | × | ✓ | × |
[22] | MBF | × | × | × | × | × |
[23] | LSSS | ✓ | × | × | ✓ | × |
[13] | MBF | × | × | × | ✓ | × |
PCE-EtoE | LSSS | ✓ | ✓ | ✓ | ✓ | ✓ |
Symbol | Description | Symbol | Description |
---|---|---|---|
Public key of KCGS | POL | Access policy | |
Private key of KCGS | Secondary ciphertext | ||
S | User’s attributes | Enc | AES encryption |
User’s credential | Dec | AES decryption | |
Public key of user | First-class ciphertext | ||
Private key of user | Maximum time difference | ||
The shared key of the and the COS | Current timestamp | ||
The shared key of the and the COS | M | Group chat messages | |
The timestamp of the text message | TS | Timestamp of the image message |
Symbols | Description |
---|---|
Exponentiation operations in groups | |
Numbers of signature/encryption attributes involved | |
P | Bilinear mapping operation |
Scheme | User Signcryption | User Un-Signcryption |
---|---|---|
PCEA [13] | ||
PCE-EtoE |
Algorithms | Setup | KCGSKeyGen | CreGen |
Time complexity | |||
Algorithms | CreVer | UserKeyGen | Key Agreement |
Time complexity | |||
Algorithms | MesSen | MesForw | MesRece |
Time complexity |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yu, F.; Meng, L.; Li, X.; Jiang, D.; Zhu, W.; Zeng, Z. An Attribute-Based End-to-End Policy-Controlled Signcryption Scheme for Secure Group Chat Communication. Mathematics 2024, 12, 2906. https://doi.org/10.3390/math12182906
Yu F, Meng L, Li X, Jiang D, Zhu W, Zeng Z. An Attribute-Based End-to-End Policy-Controlled Signcryption Scheme for Secure Group Chat Communication. Mathematics. 2024; 12(18):2906. https://doi.org/10.3390/math12182906
Chicago/Turabian StyleYu, Feng, Linghui Meng, Xianxian Li, Daicen Jiang, Weidong Zhu, and Zhihua Zeng. 2024. "An Attribute-Based End-to-End Policy-Controlled Signcryption Scheme for Secure Group Chat Communication" Mathematics 12, no. 18: 2906. https://doi.org/10.3390/math12182906
APA StyleYu, F., Meng, L., Li, X., Jiang, D., Zhu, W., & Zeng, Z. (2024). An Attribute-Based End-to-End Policy-Controlled Signcryption Scheme for Secure Group Chat Communication. Mathematics, 12(18), 2906. https://doi.org/10.3390/math12182906