Identity-based online/offline signcryption for low power devices

被引:25
|
作者
Li, Fagen [1 ,2 ,3 ]
Khan, Muhammad Khurram [4 ]
Alghathbar, Khaled [4 ]
Takagi, Tsuyoshi [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[3] Kyushu Univ, Fac Math, Fukuoka 8190395, Japan
[4] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Low power devices; Identity-based cryptography; Online/offline signcryption; Bilinear pairings; Provable security; SIGNATURES; EFFICIENT; SECURITY; MULTISIGNATURES; SCHEME;
D O I
10.1016/j.jnca.2011.08.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Confidentiality and authentication are the basic security requirements for many cryptographic applications. In this paper, we propose an efficient identity-based online/offline signcryption scheme, which is very suitable for low power devices such as smart cards or mobile devices. Our scheme has the following advantages: (i) It does not need to authenticate a public key and fulfills both confidentiality and authentication simultaneously at a lower cost. (ii) Most of computations are carried out offline and online part is very efficient. (iii) It does not require the message and the receiver's identity in the offline stage. The message and the receiver's identity are only needed in the online stage. Compared with the existing schemes, our scheme have the great advantage of the offline storage and ciphertext length. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:340 / 347
页数:8
相关论文
共 50 条
  • [21] Identity-Based Online/Offline Encryption Scheme from LWE
    Zuo, Binger
    Li, Jiguo
    Zhang, Yichen
    Shen, Jian
    INFORMATION, 2024, 15 (09)
  • [22] A practical identity-based signcryption scheme
    Chen, Huiyan
    Li, Yong
    Ren, Jinping
    International Journal of Network Security, 2013, 15 (06) : 484 - 489
  • [23] Identity-based proxy signcryption schemes
    Jian, Wu
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
  • [24] Multipurpose identity-based signcryption - A swiss army knife for identity-based cryptography
    Boyen, X
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 383 - 399
  • [25] Efficient online/offline identity-based signature for wireless sensor network
    Liu, Joseph K.
    Baek, Joonsang
    Zhou, Jianying
    Yang, Yanjiang
    Wong, Jun Wen
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (04) : 287 - 296
  • [26] Online/Offline and History Indexing Identity-Based Fuzzy Message Detection
    Wang, Zhiwei
    Liu, Feng
    Yiu, Siuming
    Lan, Longwen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5553 - 5566
  • [27] An identity-based online/offline secure cloud storage auditing scheme
    Rabaninejad, Reyhaneh
    Asaar, Maryam Rajabzadeh
    Attari, Mahmoud Ahmadian
    Aref, Mohammad Reza
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1455 - 1468
  • [28] Efficient online/offline identity-based signature for wireless sensor network
    Joseph K. Liu
    Joonsang Baek
    Jianying Zhou
    Yanjiang Yang
    Jun Wen Wong
    International Journal of Information Security, 2010, 9 : 287 - 296
  • [29] An identity-based online/offline secure cloud storage auditing scheme
    Reyhaneh Rabaninejad
    Maryam Rajabzadeh Asaar
    Mahmoud Ahmadian Attari
    Mohammad Reza Aref
    Cluster Computing, 2020, 23 : 1455 - 1468
  • [30] Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience
    Yu, Qihong
    Li, Jiguo
    Ji, Sai
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022