Abstract
The technique of online/offline is regarded as a promising approach to speed up the computation of encryption, because the most part of computation, such as pairing over points on elliptic curve and exponentiation in groups, can be pre-computed in the offline phase without knowing the message to be encrypted and/or recipient’s identity. The online phase only requires light computation, such as modular multiplication. In this paper, we propose two novel identity-based online/offline schemes: a full secure identity-based online/offline encryption scheme and an identity-based online/offline signcryption scheme. Compared to the other schemes in the literature, our schemes achieve the shortest ciphertext size in both offline and online phases and demonstrate the best performance in offline computation. Our schemes are applicable to devices with limited computation power. They are proven secure in the random oracle model.
Similar content being viewed by others
References
Paulo, S., Barreto, L.M., Libert, B.: Noel McCullagh, and Jean-Jacques Quisquater. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, pp. 515–532 (2005)
Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Advances in Cryptology-EUROCRYPT 2004, Lecture Notes in Computer Science, vol. 3027, pp. 223–238. (2004)
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Proceedings of Advances in Cryptology-Eurocrypt 2004, Lecture Notes in Computer Science, vol. 3027, pp. 56–73. (2004)
Boyen, X.: Multipurpose identity-based signcryption. In: Advances in Cryptology-CRYPTO 2003, Lecture Notes in Computer Science, vol. 2729, pp. 383–399. (2003)
Chen, L., Cheng, Z.: Security proof of sakai-kasahara’s identity-based encryption scheme. In: Cryptography and Coding 2005, Lecture Notes in Computer Science, vol. 3796, pp. 442–459. (2005)
Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Public Key Cryptography-PKC 2005, Lecture Notes in Computer Science, vol. 3386, pp. 362–379. (2005)
Chow, S.S.M., Liu, J.K., Zhou, J.: Identity-based online/offline key encapsulation and encryption. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS’11, pp. 52–60. (2011)
Chu, C-K., Liu, J.K., Zhou, J., Bao, F., Deng, R.H.: Practical ID-based encryption for wireless sensor network. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS’10, pp. 337–340. (2010)
Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. J. Cryptol. 9(1), 35–67 (1996)
Gentry, C.: Practical identity-based encryption without random oracles. In: Advances in Cryptology-EUROCRYPT 2006, Lecture Notes in Computer Science, vol. 4004, pp. 445–464. (2006)
Guo, F., Mu, Y., Chen, Z.: Identity-based online/offline encryption. In: Financial Cryptography and Data Security, Lecture Notes in Computer Science, vol. 5143, pp. 247–261. (2008)
Lai, J., Mu, Y., Guo, F., Susilo, W.: Improved identity-based online/offline encryption. In: ACISP 2015, Lecture Notes in Computer Science, vol. 9144, pp. 160–173. (2015)
Li, F., Khan, M.K., Alghathbar, K., Takagi, T.: Identity-based online/offline signcryption for low power devices. J. Netw. Comput. Appl. 35(1), 340–347 (2012)
Liu, J.K., Baek, J., Zhou, J.: Online/offline identity-based signcryption revisited. In: Proceedings of the Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science, vol. 6584, pp. 36–51. (2011)
Liu, J.K., Zhou, J.: An efficient identity-based online/offline encryption scheme. In: Applied Cryptography and Network Security, Lecture Notes in Computer Science ACNS’09, vol. 5536, pp. 156–167. (2009)
Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)
Selvi, S.S.D., Vivek, S.S, Rangan, C.P: Identity based online/offline encryption scheme. Cryptology ePrint archive, report 2010/178, (2010)
Selvi, S.S.D, Vivek, S.S, Rangan, C.P.: Identity based online/offline encryption and signcryption schemes revisited. In: Security Aspects in Information Technology, Lecture Notes in Computer Science, vol. 7011, pp. 111–127. (2011)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology-CRYPTO 1984, Lecture Notes in Computer Science, vol. 196, pp. 47–53. (1985)
Sun, D., Huang, X., Mu, Y., Susilo, W.: Identity based online/offline signcryption. In: Network and Parallel Computing Workshops, Lecture Notes in Computer Science, vol. 5245, pp. 34–41. (2008)
Sun, D., Mu, Y., Susilo, W.: A generic construction of identity-based online/offline signcryption. In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA’08, pp. 707–712. (2008)
Waters, B.: Efficient identity-based encryption without random oracles. In: Advances in Cryptology-EUROCRYPT 2005, Lecture Notes in Computer Science, vol. 3494, pp. 114–127 (2005)
Waters, B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Advances in Cryptology-CRYPTO 2009, Lecture Notes in Computer Science, vol. 5677, pp. 619–636. (2009)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lai, J., Mu, Y. & Guo, F. Efficient identity-based online/offline encryption and signcryption with short ciphertext. Int. J. Inf. Secur. 16, 299–311 (2017). https://doi.org/10.1007/s10207-016-0320-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-016-0320-6