Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Reducing Security Overhead for Mobile Networks
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
An Efficient Online/Offline Signcryption Scheme for MANET
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 02
Identity-Based On-Line/Off-Line Signcryption
NPC '08 Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
An Efficient Identity-Based Online/Offline Encryption Scheme
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Efficient online/offline identity-based signature for wireless sensor network
International Journal of Information Security
Online/offline identity-based signcryption revisited
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Improved identity-based signcryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Online/Offline signatures and multisignatures for AODV and DSR routing security
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Bandwidth-adaptive partitioning for distributed execution optimization of mobile applications
Journal of Network and Computer Applications
Hi-index | 0.00 |
Confidentiality and authentication are the basic security requirements for many cryptographic applications. In this paper, we propose an efficient identity-based online/offline signcryption scheme, which is very suitable for low power devices such as smart cards or mobile devices. Our scheme has the following advantages: (i) It does not need to authenticate a public key and fulfills both confidentiality and authentication simultaneously at a lower cost. (ii) Most of computations are carried out offline and online part is very efficient. (iii) It does not require the message and the receiver's identity in the offline stage. The message and the receiver's identity are only needed in the online stage. Compared with the existing schemes, our scheme have the great advantage of the offline storage and ciphertext length.