Improved Identity-Based Online/Offline Encryption

被引:13
|
作者
Lai, Jianchang [1 ]
Mu, Yi [1 ]
Guo, Fuchun [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
关键词
Identity-based encryption; Online/offline encryption; SECURE;
D O I
10.1007/978-3-319-19962-7_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of online/offline encryption was put forth by Guo, Mu and Chen (FC 2008), where they proposed an identity-based scheme called identity-based online/offline encryption (IBOOE). An online/offline encryption separates an encryption into two stages: offline and online. The offline phase carries much more computational load than the online phase, where the offline phase does not require the information of the message to be encrypted and the identity of the receiver. Subsequently, many applications of IBOOE have been proposed in the literature. As an example, Hobenberger and Waters (PKC 2014) have recently applied it to attribute-based encryption. In this paper, we move one step further and explore a much more efficient variant. We propose an efficient semi-generic transformation to obtain an online/offline encryption from a tradition identity-based encryption (IBE). Our transformation provides a new method to separate the computation of receiver's identity into offline and online phases. The IBOOE schemes using our transformation saves one group element in both offline and online phases compared to other IBOOE schemes in identity computing. The transformed scheme still maintains the same level of security as in the original IBE scheme.
引用
收藏
页码:160 / 173
页数:14
相关论文
共 50 条
  • [1] Identity-based online/offline encryption
    Guo, Fuchun
    Mu, Yi
    Chen, Zhide
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2008, 5143 : 247 - +
  • [2] Hierarchical Identity-Based Online/Offline Encryption
    Liu, Zhongren
    Xu, Li
    Chen, Zhide
    Mu, Yi
    Guo, Fuchun
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2115 - +
  • [3] An Efficient Identity-Based Online/Offline Encryption Scheme
    Liu, Joseph K.
    Zhou, Jianying
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 156 - 167
  • [4] An Anonymous Multireceiver with Online/Offline Identity-Based Encryption
    Wang, Qihua
    Li, Fagen
    Wang, Huaqun
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [5] Identity-Based Online/Offline Encryption Scheme from LWE
    Zuo, Binger
    Li, Jiguo
    Zhang, Yichen
    Shen, Jian
    [J]. INFORMATION, 2024, 15 (09)
  • [6] Efficient identity-based online/offline encryption and signcryption with short ciphertext
    Lai, Jianchang
    Mu, Yi
    Guo, Fuchun
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (03) : 299 - 311
  • [7] Efficient identity-based online/offline encryption and signcryption with short ciphertext
    Jianchang Lai
    Yi Mu
    Fuchun Guo
    [J]. International Journal of Information Security, 2017, 16 : 299 - 311
  • [8] Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience
    Yu, Qihong
    Li, Jiguo
    Ji, Sai
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [9] Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption
    Yu, Qihong
    Shen, Jian
    Lai, Jin-Feng
    Ji, Sai
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (06): : 1287 - 1296
  • [10] An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks
    Yang, Na
    [J]. WIRELESS NETWORKS, 2022, 28 (8) : 3493 - 3502