{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T17:53:01Z","timestamp":1774806781322,"version":"3.50.1"},"reference-count":53,"publisher":"MDPI AG","issue":"15","license":[{"start":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T00:00:00Z","timestamp":1564531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Nowadays, the widely deployed and high performance Internet of Things (IoT) facilitates the communication between its terminal nodes. To enhance data sharing among terminal devices and ensure the recipients\u2019 privacy protection, a few anonymous multi-recipient broadcast encryption (AMBE) proposals are recently given. Nevertheless, the majority of these AMBE proposals are only proven be securely against adaptively chosen plain-text attack (CPA) or selectively chosen ciphertext attack (CCA). Furthermore, all AMBE proposals are subjected to key escrow issue due to inherent characteristics of the ID-based public cryptography (ID-PKC), and cannot furnish secure de-duplication detection. However, for cloud storage, it is very important for expurgating duplicate copies of the identical message since de-duplication can save the bandwidth of network and storage space. To address the above problems, in the work, we present a privacy-preserving multi-receiver certificateless broadcast encryption scheme with de-duplication (PMCBED) in the cloud-computing setting based on certificateless cryptography and anonymous broadcast encryption. In comparison with the prior AMBE proposals, our scheme has the following three characteristics. First, it can fulfill semantic security notions of data-confidentiality and receiver identity anonymity, whereas the existing proposals only accomplish them by formalizing the weaker security models. Second, it achieves duplication detection of the ciphertext for the identical message encrypted with our broadcast encryption. Finally, it also avoids the key escrow problem of the AMBE schemes.<\/jats:p>","DOI":"10.3390\/s19153370","type":"journal-article","created":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T11:37:07Z","timestamp":1564573027000},"page":"3370","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Privacy-Preserving Multi-Receiver Certificateless Broadcast Encryption Scheme with De-Duplication"],"prefix":"10.3390","volume":"19","author":[{"given":"Jianhong","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Information Sciences and Technology, North China University of Technology, Beijing 100144, China"},{"name":"National Engineering Laboratory for Big Data Collaborative Security Technology, Beijing 100015, China"},{"name":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin 541004, China"}]},{"given":"Peirong","family":"Ou","sequence":"additional","affiliation":[{"name":"College of Sciences, North China University of Technology, Beijing 100144, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,7,31]]},"reference":[{"key":"ref_1","unstructured":"Fiat, A., and Naor, M. (1993, January 22\u201326). Broadcast encryption. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1494","DOI":"10.1109\/JSTSP.2016.2607692","article-title":"Secure multiple amplify-and-forward relaying with cochannel interference","volume":"10","author":"Fan","year":"2016","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"7599","DOI":"10.1109\/TVT.2017.2669240","article-title":"Secrecy cooperative networks with outdated relay selection over correlated fading channels","volume":"66","author":"Fan","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"912","DOI":"10.1109\/TIFS.2017.2774439","article-title":"Anonymous and traceable group data sharing in cloud computing","volume":"13","author":"Shen","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_5","first-page":"524","article-title":"Data exfiltration from Internet of Things devices: iOS devices as case studies","volume":"4","author":"Choo","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comnet.2018.03.024","article-title":"Cyber-physical systems information gathering: A smart home case study","volume":"138","author":"Do","year":"2018","journal-title":"Comput. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Zhang, J. (2019). Improvement of ID-based proxy re-signature scheme with pairing-free. Wireless Netw.","DOI":"10.1007\/s11276-019-02094-4"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Bellare, M., Boldyreva, A., Desai, A., and Pointcheval, D. (2001). Key-privacy in public-key encryption. International Conference on the Theory and Application of Cryptology and Information Security, Springer.","DOI":"10.1007\/3-540-45682-1_33"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Li, X., Gu, D., Ren, Y., Ding, N., and Yuan, K. (2012, January 21\u201323). Efficient ciphertext-policy attribute based encryption with hidden policy. Proceedings of the International Conference on Internet and Distributed Computing Systems, Wu Yi Shan, China.","DOI":"10.1007\/978-3-642-34883-9_12"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Kohlweiss, M., Rial, A., and Sheedy, C. (2009, January 18\u201320). Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. Proceedings of the International Conference on Practice and Theory in Public Key Cryptography\u2014PKC, Irvine, CA, USA.","DOI":"10.1007\/978-3-642-00468-1_12"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Barth, A., Boneh, D., and Waters, B. (2006). Privacy in encrypted content distribution using private broadcast encryption. International Conference on Financial Cryptography and Data Security, Springer.","DOI":"10.1007\/11889663_4"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1856","DOI":"10.3390\/sym7041856","article-title":"Anonymous multi-receiver identity-based authenticated encryption with CCA security","volume":"7","author":"Fan","year":"2015","journal-title":"Symmetry"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1809","DOI":"10.1093\/comjnl\/bxx060","article-title":"Fully privacy-preserving ID-based broadcast encryption with authorization","volume":"60","author":"Lai","year":"2017","journal-title":"Comput. J."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Fan, C.I., Tsai, P.J., Huang, J.J., and Chen, W.T. (2013, January 10\u201312). Anonymous multi-receiver certificate-based encryption. Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC, Beijing, China.","DOI":"10.1109\/CyberC.2013.13"},{"key":"ref_15","unstructured":"Katz, J., Sahai, A., and Waters, B. Predicate encryption supporting disjunctions, polynomial equations, and inner products. Proceedings of the Theory and Applications of Cryptographic Techniques International Conference on Advances in Cryptology, Istanbul, Turkey."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1231","DOI":"10.1007\/s11390-017-1797-9","article-title":"Effective query grouping strategy in clouds","volume":"32","author":"Liu","year":"2017","journal-title":"J. Comput. Sci. Technol."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2018.02.071","article-title":"Divoram: Towards a practical oblivious ram with variable block size","volume":"447","author":"Liu","year":"2018","journal-title":"Inf. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"23344","DOI":"10.1109\/ACCESS.2018.2822945","article-title":"Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial iot","volume":"6","author":"Jhaveri","year":"2018","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2415","DOI":"10.1007\/s10586-017-0796-5","article-title":"Towards secure and flexible ehr sharing in mobile health cloud under static assumptions","volume":"20","author":"Cai","year":"2017","journal-title":"Clust. Comput."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.jnca.2018.03.006","article-title":"Multi-authority fine-grained access control with accountability and its application in cloud","volume":"112","author":"Li","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2385","DOI":"10.1007\/s10586-016-0701-7","article-title":"New directly revocable attribute-based encryption scheme and its application in cloud storage environment","volume":"20","author":"Wang","year":"2017","journal-title":"Clust. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TC.2013.208","article-title":"Identitybased encryption with outsourced revocation in cloud computing","volume":"64","author":"Li","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.jnca.2017.12.017","article-title":"A remotely keyed file encryption scheme under mobile cloud computing","volume":"106","author":"Yang","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_24","first-page":"431","article-title":"Generating stable biometric keys for flexible cloud computing authentication using finger vein","volume":"433","author":"Wu","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"37865","DOI":"10.1109\/ACCESS.2019.2899828","article-title":"Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.jnca.2016.11.018","article-title":"Pervasive social networking forensics: Intelligence and evidence from mobile device extracts","volume":"86","author":"Quick","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Bakas, A., and Michalas, A. (2019, January 23\u201325). Modern family: A revocable hybrid encryption scheme based on attribute-based encryption, symmetric searchable encryption and SGX. Proceedings of the 15th EAI International Conference on Security and Privacy in Communication Networks (SecureComm \u201919), Orlando, FL, USA.","DOI":"10.1007\/978-3-030-37231-6_28"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Michalas, A. (2019, January 8\u201312). The lord of the shares: Combining attribute-based encryption and searchable encryption for flexible data sharing. Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing (SAC), Limassol, Cyprus.","DOI":"10.1145\/3297280.3297297"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","article-title":"Secure de-duplication with efficient and reliable convergent key management","volume":"25","author":"Li","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_30","first-page":"206","article-title":"Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model","volume":"Volume 7293","author":"Libert","year":"2012","journal-title":"International Workshop on Public Key Cryptography LNCS"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Fazio, N., and Perera, I.M. (2012). Outsider-anonymous broadcast encryption with sublinear ciphertexts. International Workshop on Public Key Cryptography, Springer.","DOI":"10.1007\/978-3-642-30057-8_14"},{"key":"ref_32","first-page":"200","article-title":"Identity-based broadcast encryption with constant size ciphertexts and private keys","volume":"Volume 4833","author":"Delerablee","year":"2007","journal-title":"International Conference on the Theory and Application of Cryptology and Information Security. ASIACRYPT 2007, Lecture Notes in Computer Science"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Galindo, D. (2005). Boneh-Franklin identity based encryption revisited. International Colloquium on Automata, Languages, and Programming, Springer. ICALP 2005, LNCS 3580.","DOI":"10.1007\/11523468_64"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1049\/iet-ifs.2010.0252","article-title":"Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme","volume":"6","author":"Wang","year":"2012","journal-title":"Inf. Secur. IET"},{"key":"ref_35","unstructured":"Chien, H.Y. (2012). Improved Anonymous Multi-Receiver Identity-Based Encryption, Oxford University Press."},{"key":"ref_36","first-page":"400","article-title":"Comment on Wang et al.\u2019s anonymous multi-receiver id-based encryption scheme and its improved schemes","volume":"7","author":"Zhang","year":"2013","journal-title":"Int. J. Intell. Inf. Database Syst."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSYST.2015.2451193","article-title":"Efficient anonymous multireceiver certificateless encryption","volume":"11","author":"Hung","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_38","unstructured":"Xu, P., Li, J., Wang, W., and Jin, H. (June, January 30). Anonymous identity-based broadcast encryption with constant decryption complexity and strong security. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, Xi\u2019an, China."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.tcs.2014.04.027","article-title":"Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts","volume":"539","author":"Liang","year":"2014","journal-title":"Theor. Comput. Sci."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Boyen, X., and Haines, T. (2018). Forward-secure linkable ring signatures. Australasian Conference on Information Security and Privacy, Springer.","DOI":"10.1007\/978-3-319-93638-3_15"},{"key":"ref_41","unstructured":"He, K., Weng, J., Liu, J.N., Liu, J.K., Liu, W., and Deng, R.H. (June, January 30). Anonymous identity-based broadcast encryption with chosen-ciphertext security. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, Xi\u2019an, China."},{"key":"ref_42","first-page":"452","article-title":"Certificateless Public Key Cryptography","volume":"Volume 2894","author":"Paterson","year":"2003","journal-title":"Advances in Cryptology\u2014ASIACRYPT 2003. Lecture Notes in Computer Science"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Yum, D.H., and Lee, P.J. (2004). Generic construction of certificateless encryption. International Conference on Computational Science and Its Applications, Springer.","DOI":"10.1007\/978-3-540-24707-4_93"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Libert, B., and Quisquater, J.J. (2006). On constructing certificateless cryptosystems from identity based encryption. International Workshop on Public Key Cryptography, Springer.","DOI":"10.1007\/11745853_31"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"2214","DOI":"10.1002\/sec.1165","article-title":"Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing","volume":"8","author":"Islam","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref_46","unstructured":"Douceur, J.R., Adya, A., Bolosky, W.J., Simon, P., and Theimer, M. (2002, January 2\u20135). Reclaiming space from duplicate files in a serverless distributed file system. Proceedings of the 22nd International Conference on Distributed Computing Systems, Vienna, Austria."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Bellare, M., Keelveedhi, S., and Ristenpart, T. (2013). Message-locked encryption and secure de-duplication. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Bellare, M., and Keelveedhi, S. (2015). Interactive message-locked encryption and secure de-duplication. IACR International Workshop on Public Key Cryptography, Springer.","DOI":"10.1007\/978-3-662-46447-2_23"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1206","DOI":"10.1109\/TPDS.2014.2318320","article-title":"A hybrid cloud approach for secure authorized de-duplication","volume":"26","author":"Li","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"3569","DOI":"10.1109\/TC.2015.2401017","article-title":"Secure distributed de-duplication systems with improved reliability","volume":"64","author":"Li","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"1437","DOI":"10.1007\/s00500-015-1596-6","article-title":"A secure cloud storage system supporting privacy-preserving fuzzy de-duplication","volume":"20","author":"Li","year":"2016","journal-title":"Soft Comput."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., and Persiano, G. (2004, January 2\u20136). Public key encryption with keyword search. Proceedings of the International Conference on the Theoryand Applications of Cryptographic Techniques, EUROCRYPT 2004, Interlaken, Switzerland.","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Cui, H., Deng, R.H., Li, Y., and Wu, G. (2017). Attribute-based storage supporting secure de-duplication of encrypted data in cloud. IEEE Trans. Big Data.","DOI":"10.1016\/j.future.2017.10.010"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/15\/3370\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:11:51Z","timestamp":1760188311000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/15\/3370"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,31]]},"references-count":53,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2019,8]]}},"alternative-id":["s19153370"],"URL":"https:\/\/doi.org\/10.3390\/s19153370","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,31]]}}}