skip to main content
10.1145/1755688.1755734acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Practical ID-based encryption for wireless sensor network

Published:13 April 2010Publication History

ABSTRACT

In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity-based Encryption (RB-OOIBE). It splits the encryption process into two parts -- the offline and the online part. In the offline part, all heavy computations are done without the knowledge of the receiver's identity and the plaintext message. In the online stage, only light computations such as modular operation and symmetric key encryption are required, together with the receiver's identity and the plaintext message. Moreover, since each offline ciphertext can be re-used for the same receiver, the number of offline ciphertexts the encrypter holds only confines the number of receivers instead of the number of messages to be encrypted. In this way, a sensor node (with limited computation power and limited storage) in WSN can send encrypted data easily: A few offline ciphertexts can be computed in the manufacturing stage while the online part is light enough for the sensor to process.

References

  1. Mihir Bellare, Tadayoshi Kohno, and Victor Shoup. Stateful Public-key Cryptosystems: How to Encrypt with One 160-bit Exponentiation. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pages 380--389. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Dan Boneh and Xavier Boyen. Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In Proceedings of Advances in Cryptology - EUROCRYPT '04, volume 3027 of LNCS, pages 223--238. Springer, 2004.Google ScholarGoogle Scholar
  3. Dan Boneh and Xavier Boyen. Short Signatures Without Random Oracles the SDH Assumption in Bilinear Groups. Journal of Cryptology, 21(2):149--177, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Dan Boneh and Matthew K. Franklin. Identity-Based Encryption from the Weil Pairing. In Proceedings of Advances in Cryptology - CRYPTO '01, volume 2139 of LNCS, pages 213--229. Springer, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Shimon Even, Oded Goldreich, and Silvio Micali. On-line/off-line digital schemes. In Proceedings of Advances in Cryptology - CRYPTO '89, volume 435 of LNCS, pages 263--275. Springer, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Fuchun Guo, Yi Mu, and Zhide Chen. Identity-based online/offline encryption. In Proceedings of Financial Cryptography and Data Security (FC '08), volume 5143 of LNCS, pages 247--261. Springer, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Joseph K. Liu and Jianying Zhou. An efficient identity-based online/offline encryption scheme. In Proceedings of Applied Cryptography and Network Security 2009 (ACNS '09), volume 5536 of LNCS, pages 156--167. Springer, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Le Trieu Phong, Hiroto Matsuoka, and Wakaha Ogata. Stateful identity-based encryption scheme: faster encryption and decryption. In Proceedings of the ACM Symposium on Information, Computer & Communication Security (ASIACCS '08), pages 381--388. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Adi Shamir. Identity-based cryptosystems and signature schemes. In Proceedings of Advances in Cryptology - CRYPTO '84, volume 196 of LNCS, pages 47--53. Springer, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Practical ID-based encryption for wireless sensor network

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ASIACCS '10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
          April 2010
          363 pages
          ISBN:9781605589367
          DOI:10.1145/1755688

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 April 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          ASIACCS '10 Paper Acceptance Rate25of166submissions,15%Overall Acceptance Rate418of2,322submissions,18%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader