ABSTRACT
In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity-based Encryption (RB-OOIBE). It splits the encryption process into two parts -- the offline and the online part. In the offline part, all heavy computations are done without the knowledge of the receiver's identity and the plaintext message. In the online stage, only light computations such as modular operation and symmetric key encryption are required, together with the receiver's identity and the plaintext message. Moreover, since each offline ciphertext can be re-used for the same receiver, the number of offline ciphertexts the encrypter holds only confines the number of receivers instead of the number of messages to be encrypted. In this way, a sensor node (with limited computation power and limited storage) in WSN can send encrypted data easily: A few offline ciphertexts can be computed in the manufacturing stage while the online part is light enough for the sensor to process.
- Mihir Bellare, Tadayoshi Kohno, and Victor Shoup. Stateful Public-key Cryptosystems: How to Encrypt with One 160-bit Exponentiation. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pages 380--389. ACM, 2006. Google ScholarDigital Library
- Dan Boneh and Xavier Boyen. Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In Proceedings of Advances in Cryptology - EUROCRYPT '04, volume 3027 of LNCS, pages 223--238. Springer, 2004.Google Scholar
- Dan Boneh and Xavier Boyen. Short Signatures Without Random Oracles the SDH Assumption in Bilinear Groups. Journal of Cryptology, 21(2):149--177, 2008. Google ScholarDigital Library
- Dan Boneh and Matthew K. Franklin. Identity-Based Encryption from the Weil Pairing. In Proceedings of Advances in Cryptology - CRYPTO '01, volume 2139 of LNCS, pages 213--229. Springer, 2001. Google ScholarDigital Library
- Shimon Even, Oded Goldreich, and Silvio Micali. On-line/off-line digital schemes. In Proceedings of Advances in Cryptology - CRYPTO '89, volume 435 of LNCS, pages 263--275. Springer, 1989. Google ScholarDigital Library
- Fuchun Guo, Yi Mu, and Zhide Chen. Identity-based online/offline encryption. In Proceedings of Financial Cryptography and Data Security (FC '08), volume 5143 of LNCS, pages 247--261. Springer, 2008. Google ScholarDigital Library
- Joseph K. Liu and Jianying Zhou. An efficient identity-based online/offline encryption scheme. In Proceedings of Applied Cryptography and Network Security 2009 (ACNS '09), volume 5536 of LNCS, pages 156--167. Springer, 2009. Google ScholarDigital Library
- Le Trieu Phong, Hiroto Matsuoka, and Wakaha Ogata. Stateful identity-based encryption scheme: faster encryption and decryption. In Proceedings of the ACM Symposium on Information, Computer & Communication Security (ASIACCS '08), pages 381--388. ACM, 2008. Google ScholarDigital Library
- Adi Shamir. Identity-based cryptosystems and signature schemes. In Proceedings of Advances in Cryptology - CRYPTO '84, volume 196 of LNCS, pages 47--53. Springer, 1984. Google ScholarDigital Library
Index Terms
- Practical ID-based encryption for wireless sensor network
Recommendations
A Fully Secure Revocable ID-Based Encryption in the Standard Model
Revocation problem is a critical issue for key management of public key systems. Any certificate-based or identity (ID)-based public key systems must provide a revocation method to revoke misbehaving/compromised users from the public key systems. In the ...
Adaptive-ID Secure Revocable Identity-Based Encryption
CT-RSA '09: Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in CryptologyIdentity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital certificates. While revocation has been thoroughly studied in PKIs, few revocation mechanisms are known in the IBE setting. ...
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
Information Security and Cryptology --- ICISC 2008In this paper, we present a simple and generic method for constructing public key encryption (PKE) secure against chosen ciphertext attacks (CCA) from identity-based encryption (IBE). Specifically, we show that a CCA-secure PKE scheme can be generically ...
Comments