Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
On-line/off-line digital signatures
CRYPTO '89 Proceedings on Advances in cryptology
Improved Online/Offline Signature Schemes
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups
Journal of Cryptology
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Identity-Based Online/Offline Encryption
Financial Cryptography and Data Security
An Efficient On-Line/Off-Line Signature Scheme without Random Oracles
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
New online/offline signature schemes without random oracles
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Identity-based online/offline key encapsulation and encryption
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Identity-based server-aided decryption
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Online/offline identity-based signcryption revisited
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Identity based online/offline encryption and signcryption schemes revisited
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Identity-based online/offline signcryption for low power devices
Journal of Network and Computer Applications
Security and Communication Networks
Efficient online/offline signcryption without key exposure
International Journal of Grid and Utility Computing
Server-aided identity-based anonymous broadcast encryption
International Journal of Security and Networks
Hi-index | 0.00 |
In this paper, we present an efficient Identity-based Online / Offline Encryption (IBOOE) scheme. An IBOOE scheme allows one to split the encryption into two phases. In the offline phase, most heavy computations such as exponentiation or pairing, if any, are done in this phase. Yet it does not require the knowledge of the plaintext or the receiver's identity. This nice property allows it can be executed `offline', or inside some powerful device. The next phase is called the online phase, where only light computations such as integer addition, multiplication or hashing are needed, together with the plaintext and the receiver's identity. This can be executed inside some embedded device such as smart card or wireless sensor where the computation power is very limited. We propose an efficient IBOOE scheme, with great improvement in the computation requirement of both the offline, online encryption phase and decryption phase, together with much shorten ciphertext over previous schemes. Our scheme can be proven secure in the random oracle model.