[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2062981.2062996guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Identity based online/offline encryption and signcryption schemes revisited

Published: 19 October 2011 Publication History

Abstract

Consider the situation where a low power device with limited computational power has to perform cryptographic operation in order to do secure communication to the base station where the computational power is not limited. The most obvious way is to split each and every cryptographic operations into resource consuming, heavy operations and the fast light weight operations. This concept can be efficiently implemented through online/offline cryptography. In this paper, we show the security weakness of an identity based online offline encryption scheme proposed in ACNS 09 by Liu et al. [9]. The scheme in [9] is the first identity based online offline encryption scheme in the random oracle model, in which the message and recipient are not known during the offline phase. We have shown that this scheme is not CCA secure. We have also proposed a new identity based online offline encryption scheme in which the message and receiver are not known during the offline phase and is efficient than the scheme in [9].
Online/Offline signcryption is a cryptographic primitive where the signcryption process is divided into two phases - online and offline phase. To the best of our knowledge there exists three online/offline signcryption schemes in the literature: we propose various attacks on two of the existing schemes. Then, we present an efficient and provably secure identity based online/offline signcryption scheme. We formally prove the security of the new scheme in the random oracle model.

References

[1]
An, J.H., Dodis, Y., Rabin, T.: On the Security of Joint Signature and Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 83-107. Springer, Heidelberg (2002).
[2]
Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004).
[3]
Chow, S.S.M., Liu, J.K., Zhou, J.: Identity-based online/offline key encapsulation and encryption. Cryptology ePrint Archive, Report 2010/194 (2010).
[4]
Dutta, R., Barua, R., Sarkar, P.: Pairing-based cryptographic protocols: A survey. In: Cryptology ePrint Archive, Report 2004/064 (2004).
[5]
Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. Journal of Cryptology 9(1) (1996).
[6]
Gentry, C.: Practical Identity-Based Encryption Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006).
[7]
Guo, F., Mu, Y., Chen, Z.: Identity-Based Online/Offline Encryption. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 247-261. Springer, Heidelberg (2008).
[8]
Liu, J.K., Baek, J., Zhou, J.: Online/Offline identity-based signcryption revisited. In: Lai, X., Yung, M., Lin, D. (eds.) Inscrypt 2010. LNCS, vol. 6584, pp. 36-51. Springer, Heidelberg (2011), http://eprint.iacr.org/
[9]
Liu, J.K., Zhou, J.: An Efficient Identity-Based Online/Offline Encryption Scheme. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 156-167. Springer, Heidelberg (2009).
[10]
Schnorr, C.-P.: Efficient signature generation by smart cards. J. Cryptology 4(3) (1991).
[11]
Sharmila Deva Selvi, S., Sree Vivek, S., Pandu Rangan, C.: Identity based online/ offline encryption scheme. Cryptology ePrint Archive, Report 2010/178 (2010).
[12]
Sharmila Deva Selvi, S., Sree Vivek,S., Pandu Rangan, C.: Identity based online/ offline signcryption scheme. Cryptology ePrint Archive, Report 2010/376 (2010).
[13]
Shamir, A., Tauman, Y.: Improved Online/Offline Signature Schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355-367. Springer, Heidelberg (2001).
[14]
Sun, D., Huang, X., Mu, Y., Susilo, W.: Identity-based on-line/off-line signcryption. In: Cao, J., Li, M., Wu, M.-Y., Chen, J. (eds.) NPC 2008. LNCS, vol. 5245, pp. 34-41. Springer, Heidelberg (2008).
[15]
Sun, D., Mu, Y., Susilo, W.: A generic construction of identity-based online/offline signcryption. In: ISPA, pp. 707-712. IEEE, Los Alamitos (2008).
[16]
Zhang, F., Mu, Y., Susilo, W.: Reducing security overhead for mobile networks. In: AINA 2005: Proceedings of the 19th International Conference on Advanced Information Networking and Applications, pp. 398-403. IEEE Computer Society, Los Alamitos (2005).
[17]
Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997).

Cited By

View all
  • (2017)Energy-efficient mechanisms in security of the internet of thingsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2017.08.006127:C(173-189)Online publication date: 9-Nov-2017
  • (2017)Efficient identity-based online/offline encryption and signcryption with short ciphertextInternational Journal of Information Security10.1007/s10207-016-0320-616:3(299-311)Online publication date: 1-Jun-2017
  • (2014)Online/Offline Attribute-Based EncryptionProceedings of the 17th International Conference on Public-Key Cryptography --- PKC 2014 - Volume 838310.1007/978-3-642-54631-0_17(293-310)Online publication date: 26-Mar-2014

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
InfoSecHiComNet'11: Proceedings of the First international conference on Security aspects in information technology
October 2011
185 pages
ISBN:9783642245855
  • Editors:
  • Marc Joye,
  • Debdeep Mukhopadhyay,
  • Michael Tunstall

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 19 October 2011

Author Tags

  1. confidentiality
  2. cryptanalysis
  3. encryption
  4. identity based cryptography
  5. online/offline
  6. random oracle model
  7. signcryption
  8. unforgeability

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Energy-efficient mechanisms in security of the internet of thingsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2017.08.006127:C(173-189)Online publication date: 9-Nov-2017
  • (2017)Efficient identity-based online/offline encryption and signcryption with short ciphertextInternational Journal of Information Security10.1007/s10207-016-0320-616:3(299-311)Online publication date: 1-Jun-2017
  • (2014)Online/Offline Attribute-Based EncryptionProceedings of the 17th International Conference on Public-Key Cryptography --- PKC 2014 - Volume 838310.1007/978-3-642-54631-0_17(293-310)Online publication date: 26-Mar-2014

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media