Skip to main content

Design of Anonymous Communication Protocol Based on Group Signature

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11983))

Included in the following conference series:

  • 1077 Accesses

Abstract

The onion routing protocol enables low-latency anonymous communication over the public network. Currently, many onion routing protocols have been proposed to enable anonymous connections between users, such as Tor. Even though existing onion routing protocols appear to have a secure structure, there are still some disadvantages in terms of efficiency and security. This paper proposes a new onion routing protocol based on certificateless group signature, which uses the new designed certificateless group signature scheme to achieve anonymous authentication of messages. In the protocol, this paper modifies the data encapsulation format of the transmission, and uses only the key shared with the receiver to encrypt the data payload in a single layer. The proposed protocol not only reduces the encryption and decryption operations of the data packets in the transmission process, but also improves the forwarding efficiency of the message, and further realizes the anonymous authentication and integrity of the message forwarding.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Asoni, D.E., Chen, C., Barrera, D., Perrig, A.: On building onion routing into future internet architectures. In: Camenisch, J., Kesdoğan, D. (eds.) iNetSec 2015. LNCS, vol. 9591, pp. 71–81. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39028-4_6

    Chapter  Google Scholar 

  2. Backes, M., Goldberg, I., Kate, A., Mohammadi, E.: Provably secure and practical onion routing. In: Computer Security Foundations Symposium, vol. 6. IEEE (2012)

    Google Scholar 

  3. Burgstaller, F., Derler, A., Kern, S., Schanner, G., Reiter, A.: Anonymous communication in the browser via onion-routing. In: International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, vol. 4 (2016)

    Google Scholar 

  4. Catalano, D., Fiore, D., Gennaro, R.: Certificateless onion routing, vol. 3, no. 51, pp. 151–160 (2009)

    Google Scholar 

  5. Catalano, D., Fiore, D., Gennaro, R.: A certificateless approach to onion routing. Int. J. Inf. Secur. 16(3), 327–343 (2017)

    Article  Google Scholar 

  6. Chen, H., Zhu, C., Song, R.: Efficient certificateless signature and group signature schemes. J. Comput. Res. Dev. 2, 231–237 (2010)

    Google Scholar 

  7. Chen, C., Asoni, D.E., Barrera, D.: HORNET: high-speed onion routing at the network layer, vol. 4, no. 5, p. 51 (2015)

    Google Scholar 

  8. Chen, Q., Bridges, R.A.: Automated behavioral analysis of malware a case study of wannacry ransomware, vol. 2, pp. 454–460. arXiv preprint (2017)

    Google Scholar 

  9. Dhankani, M., Dhameja, A., Darda, S., Bohra, D.: Anonymous communication system based on onion routing. Int. J. Comput. Appl. 23, 12–15 (2015)

    Google Scholar 

  10. Emura, K., Kanaoka, A., Ohta, S., Takahashi, T.: Building secure and anonymous communication channel: formal model and its prototype implementation. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, vol. 4, no. 1, pp. 1641–1648 (2014)

    Google Scholar 

  11. Jiang, L., Li, T., Li, X.: Anonymous communication via anonymous identity-based encryption and its application in IoT. In: Wireless Communications and Mobile Computing, vol. 4, p. 2018. IEEE (2018)

    Google Scholar 

  12. Mahmood, K., Li, X., Chaudhry, S.A., Naqvi, H., Kumari, S., Sangaiah, A.K., Rodrigues, J.J.: Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure. Future Gener. Comput. Syst. 88, 491–500 (2018)

    Article  Google Scholar 

  13. Tsai, J.L.: A new efficient certificateless short signature scheme using bilinear pairings. IEEE Syst. J. 11(4), 2395–2402 (2015)

    Article  Google Scholar 

  14. Liang, Y., Zhang, X., Zheng, Z.: Electronic cash system based on certificateless group signature. J. Commun. 37(5), 184–190 (2016)

    Google Scholar 

  15. Shirazi, F., Simeonovski, M., Asghar, M.R., Backes, M., Diaz, C.: A survey on routing in anonymous communication protocols, vol. 3, no. 51, pp. 70–74 (2016)

    Google Scholar 

  16. Yameng, C., Xiangguo, C.: Certificateless group signature scheme from bilinear pairings, vol. 3, no. 51, pp. 262–267 (2017)

    Google Scholar 

  17. Yang, X., Yi, X., Khalil, I.: A new privacy-preserving authentication protocol for anonymous web browsing. Concurr. Comput. Pract. Exp. 3(11), 4706 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fengyin Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhu, H., Cui, C., Li, F., Liu, Z., Zhang, Q. (2019). Design of Anonymous Communication Protocol Based on Group Signature. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37352-8_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37351-1

  • Online ISBN: 978-3-030-37352-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics