Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.5.23

Identity-Based Online/Offline Signcryption Without Random Oracles  

Park, Seung-Hwan (Graduate School of information Management and Security, Korea University)
Kim, Ki-Tak (Graduate School of information Management and Security, Korea University)
Koo, Woo-Kwon (Graduate School of information Management and Security, Korea University)
Lee, Dong-Hoon (Graduate School of information Management and Security, Korea University)
Abstract
Signcryption is a cryptographic primitive which offers authentication and confidentiality simultaneously with a cost lower than signing and encrypting the message independently. We propose a new cryptographic notion called Identity-based online/offline signcryption. The notion of online/offline scheme can be divided into two phases, the first phase is performed offline prior to the arrival of a message to be signed or encrypted and the second phase is performed online phase after knowing the message and the public key of recipient. The Online phase does not require any heavy computations such as pairings or exponents. It is particularly suitable for power-constrained devices such as smart cards. In this paper, we propose ID-based signcryption scheme and ID-based online/offline signcryption scheme where the confidentiality and authenticity are simultaneously required to enable a secure and trustable communication environment. To our best knowledge, this is the first ID-based online/offline signcryption scheme that can be proven secure in the standard model.
Keywords
Signcryption; Online/Offline; ID Based Cryptosystem;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Gentry, "Practical Identity-Based Encryption Without Random Oracles," In: Vaudenay, S. (eds.) EUROCRYPT 2006. LNCS 4004, pp. 445-464, 2006.
2 F. Guo, Y. Mu and Z. Chen, "Identity- based online/offline encryption," In: Tsudik, G. (eds.) FC 2008. LNCS, vol.5143, pp. 247-261, 2008.
3 J. Li, X. Chen, F. Zhang and Y. Wang, "Generalization of the Selective-ID Security Model for HIBS Protocols," In: Y. Wang, Y. Chung, and H.Liu (ed.) CIS 2003, LNAI, vol.4456, pp. 894-902, 2007.
4 J.K. Liu and J. Zhou, "An Efficient Identity-Based Online/Offline Encryption Scheme" In: Abdalla, M. (eds.) ACNS 2009. LNCS 5536, pp. 156-167, 2009
5 X. Boyen, "Multipurpose Identity-Based Signcryption A Swiss Army Knife for Identity-Based Cryptography" In: Boneh, D. (ed.) CRYPTO 2003, pp. 383-399, Aug. 2003.
6 R. Canetti, S. Halevi and J. Katz, "Chosen-ciphertext security from udentity- based encryption," In: Proceedings of Eurocrypt 2004, LNSC, pp. 207-222, 2004.
7 S. S. M. Chow, T. H. Yuen, L. C. K. Hui and S. M. Yiu, "Signcryption in Hierarchical Identity Based Cryptosystem," In: Security and Privacy in the Age of Ubiquitous Computing, Springer Boston, vol.181, pp. 443-457, 2005.   DOI
8 S. Even, O. Goldreich, S. Micali, "Online/ Offline Digital signature," In: Brassard, G. (eds.) CRYPTO 1989. LNCS, vol.435, pp. 263-275, 1990.
9 D. Boneh, and M. Franklin, "Identity- Based Encryption from the Weil pairing," In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229, 2001.
10 D. Boneh and X. Boyeh, "Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles," In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238, 2004.
11 J. K. Liu, J. Baek, J. Zhou, "Online/ Offline Identity-Baed Signcryption Re-visited," In: Cryptology ePrint Archive, Report 2010-274, May 2010.
12 J.K. Liu and J. Zhou, "An Efficient Identity-Based Online/Offline Encryption Scheme" In: Abdalla, M. (eds.) ACNS 2009. LNCS 5536, pp. 156-167, 2009
13 S.F. Shahandashti and R. Safavi-Naini, "Theshold Attribute-Based Signatures and Their Application to Anonymous Credential systems," In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS 5580, pp. 198-216, 2009.
14 A. Shamir, "Identity-based cryptosystems and signature schemes," In: Advances in Cryptology -Crypto 1984,, LNSC 196, pp. 47-53, 1984
15 B. Waters, "Efficient Identity-Based Encryption without Random Oracles," In: Cramer, R.J.F. (eds.) EUROCRYPT 2005. LNCS 3494, pp. 114-127, 2005.
16 Y. Yu, B. Yang, Y. Sun and S. Zhu, "Identity-Based Signcryption Scheme Without Random Oracles," In: CSI 2009. vol.31, pp. 56-62, 2009.
17 S. Xu, Y. Mu and W. Susilo, "Online/ Offline Signatures and Multisignatures for AVOD and DSR routing security," In: ACISP 06, LNCS 4058, pp. 99-110, 2006