Efficient identity-based online/offline encryption and signcryption with short ciphertext

The technique of online/offline is regarded as a promising approach to speed up the computation of encryption, because the most part of computation, such as pairing over points on elliptic curve and exponentiation in groups, can be pre-computed in the offline phase without knowing the message to be encrypted and/or recipient’s identity. The online phase only requires light computation, such as modular multiplication. In this paper, we propose two novel identity-based online/offline schemes: a full secure identity-based online/offline encryption scheme and an identity-based online/offline signcryption scheme. Compared to the other schemes in the literature, our schemes achieve the shortest ciphertext size in both offline and online phases and demonstrate the best performance in offline computation. Our schemes are applicable to devices with limited computation power. They are proven secure in the random oracle model.

[1]  Yi Mu,et al.  Identity-Based On-Line/Off-Line Signcryption , 2008, 2008 IFIP International Conference on Network and Parallel Computing.

[2]  Fuchun Guo,et al.  Identity-Based Online/Offline Encryption , 2008, Financial Cryptography.

[3]  Robert H. Deng,et al.  Practical ID-based encryption for wireless sensor network , 2010, ASIACCS '10.

[4]  Joseph K. Liu,et al.  Identity-based online/offline key encapsulation and encryption , 2011, ASIACCS '11.

[5]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[6]  Liqun Chen,et al.  Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme , 2005, IMACC.

[7]  C. Pandu Rangan,et al.  Identity Based Online/Offline Encryption Scheme , 2010, IACR Cryptol. ePrint Arch..

[8]  C. Pandu Rangan,et al.  Identity Based Online/Offline Encryption and Signcryption Schemes Revisited , 2011, InfoSecHiComNet.

[9]  Brent Waters,et al.  Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..

[10]  Fagen Li,et al.  Identity-based online/offline signcryption for low power devices , 2012, J. Netw. Comput. Appl..

[11]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[12]  Craig Gentry,et al.  Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.

[13]  Joseph K. Liu,et al.  An Efficient Identity-Based Online/Offline Encryption Scheme , 2009, ACNS.

[14]  Silvio Micali,et al.  On-line/off-line digital signatures , 1996, Journal of Cryptology.

[15]  Jacques Stern,et al.  Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.

[16]  A. Shamm Identity-based cryptosystems and signature schemes , 1985 .

[17]  C. Pandu Rangan,et al.  Identity Based Online/Offline Signcryption Scheme , 2010, IACR Cryptol. ePrint Arch..

[18]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[19]  Joonsang Baek,et al.  Online/Offline Identity-Based Signcryption Revisited , 2010, Inscrypt.

[20]  Yi Mu,et al.  A Generic Construction of Identity-Based Online/Offline Signcryption , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications.

[21]  Fuchun Guo,et al.  Improved Identity-Based Online/Offline Encryption , 2015, ACISP.

[22]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[23]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[24]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[25]  Dan Boneh,et al.  Short Signatures Without Random Oracles , 2004, EUROCRYPT.