Identity-based online/offline signcryption for low power devices

被引:25
|
作者
Li, Fagen [1 ,2 ,3 ]
Khan, Muhammad Khurram [4 ]
Alghathbar, Khaled [4 ]
Takagi, Tsuyoshi [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[3] Kyushu Univ, Fac Math, Fukuoka 8190395, Japan
[4] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Low power devices; Identity-based cryptography; Online/offline signcryption; Bilinear pairings; Provable security; SIGNATURES; EFFICIENT; SECURITY; MULTISIGNATURES; SCHEME;
D O I
10.1016/j.jnca.2011.08.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Confidentiality and authentication are the basic security requirements for many cryptographic applications. In this paper, we propose an efficient identity-based online/offline signcryption scheme, which is very suitable for low power devices such as smart cards or mobile devices. Our scheme has the following advantages: (i) It does not need to authenticate a public key and fulfills both confidentiality and authentication simultaneously at a lower cost. (ii) Most of computations are carried out offline and online part is very efficient. (iii) It does not require the message and the receiver's identity in the offline stage. The message and the receiver's identity are only needed in the online stage. Compared with the existing schemes, our scheme have the great advantage of the offline storage and ciphertext length. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:340 / 347
页数:8
相关论文
共 50 条
  • [31] An Identity-Based Signcryption on Lattice without Trapdoor
    Wang, Xianmin
    Zhang, Yu
    Gupta, Brij Bhooshan
    Zhu, Hongfei
    Liu, Dongxi
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 282 - 293
  • [32] IOOSC-U2G: An Identity-Based Online/Offline Signcryption Scheme for Unmanned Aerial Vehicle to Ground Station Communication
    Ali, Ikram
    Li, Jianqiang
    Chen, Jie
    Chen, Yong
    Ullah, Shamsher
    Khan, Salabat
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (18): : 29941 - 29955
  • [33] Leakage resilient identity-based aggregate signcryption
    College of Computer, Nanjing University of Posts and Telecommunications, Nanjing
    210023, China
    Beijing Youdian Daxue Xuebao, 1600, 5 (20-25):
  • [34] Identity-based signcryption without random oracles
    Narayan, Shivaramakrishnan
    Udaya, Parampalli
    Lee, Peter Hyun-Jeen
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 342 - 347
  • [35] An efficient identity-based broadcast signcryption scheme
    Luo, Ming
    Zou, Chunhua
    Xu, Jianfeng
    Journal of Software, 2012, 7 (02) : 366 - 373
  • [36] Cryptanalysis of two identity-based signcryption schemes
    Wang, Huaqun
    Zhang, Yuqing
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 694 - 698
  • [37] A new identity-based ring signcryption scheme
    Deng, Lunzhi
    Zeng, Jiwen
    Li, Siwei
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (04) : 333 - 342
  • [38] Efficient identity-based broadcast signcryption schemes
    Kim, Intae
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 914 - 925
  • [40] Online/Offline Signatures for Low-Power Devices
    Yao, Andrew Chi-Chih
    Zhao, Yunlei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (02) : 283 - 294