An efficient identity-based online/offline encryption scheme

Joseph K Liu, Jianying Zhou

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

39 Citations (Scopus)

Abstract

In this paper, we present an efficient Identity-based Online / Offline Encryption (IBOOE) scheme. An IBOOE scheme allows one to split the encryption into two phases. In the offline phase, most heavy computations such as exponentiation or pairing, if any, are done in this phase. Yet it does not require the knowledge of the plaintext or the receiver s identity. This nice property allows it can be executed offline , or inside some powerful device. The next phase is called the online phase, where only light computations such as integer addition, multiplication or hashing are needed, together with the plaintext and the receiver s identity. This can be executed inside some embedded device such as smart card or wireless sensor where the computation power is very limited. We propose an efficient IBOOE scheme, with great improvement in the computation requirement of both the offline, online encryption phase and decryption phase, together with much shorten ciphertext over previous schemes. Our scheme can be proven secure in the random oracle model.
Original languageEnglish
Title of host publicationProceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009)
EditorsMichel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud
Place of PublicationHeidelberg Germany
PublisherSpringer
Pages156 - 167
Number of pages12
Volume5536
ISBN (Print)9783642019562
DOIs
Publication statusPublished - 2009
Externally publishedYes
EventInternational Conference on Applied Cryptography and Network Security 2009 - Paris-Rocquencourt France, Paris-Rocquencourt, France
Duration: 1 Jan 2009 → …

Conference

ConferenceInternational Conference on Applied Cryptography and Network Security 2009
Abbreviated titleACNS 2009
CountryFrance
CityParis-Rocquencourt
Period1/01/09 → …

Cite this

Liu, J. K., & Zhou, J. (2009). An efficient identity-based online/offline encryption scheme. In M. Abdalla, D. Pointcheval, P-A. Fouque, & D. Vergnaud (Eds.), Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009) (Vol. 5536, pp. 156 - 167). Heidelberg Germany: Springer. https://doi.org/10.1007/978-3-642-01957-9_10
Liu, Joseph K ; Zhou, Jianying. / An efficient identity-based online/offline encryption scheme. Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009). editor / Michel Abdalla ; David Pointcheval ; Pierre-Alain Fouque ; Damien Vergnaud. Vol. 5536 Heidelberg Germany : Springer, 2009. pp. 156 - 167
@inproceedings{614eacfbc2d44d558db575b995ec6786,
title = "An efficient identity-based online/offline encryption scheme",
abstract = "In this paper, we present an efficient Identity-based Online / Offline Encryption (IBOOE) scheme. An IBOOE scheme allows one to split the encryption into two phases. In the offline phase, most heavy computations such as exponentiation or pairing, if any, are done in this phase. Yet it does not require the knowledge of the plaintext or the receiver s identity. This nice property allows it can be executed offline , or inside some powerful device. The next phase is called the online phase, where only light computations such as integer addition, multiplication or hashing are needed, together with the plaintext and the receiver s identity. This can be executed inside some embedded device such as smart card or wireless sensor where the computation power is very limited. We propose an efficient IBOOE scheme, with great improvement in the computation requirement of both the offline, online encryption phase and decryption phase, together with much shorten ciphertext over previous schemes. Our scheme can be proven secure in the random oracle model.",
author = "Liu, {Joseph K} and Jianying Zhou",
year = "2009",
doi = "10.1007/978-3-642-01957-9_10",
language = "English",
isbn = "9783642019562",
volume = "5536",
pages = "156 -- 167",
editor = "Michel Abdalla and David Pointcheval and Pierre-Alain Fouque and Damien Vergnaud",
booktitle = "Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009)",
publisher = "Springer",

}

Liu, JK & Zhou, J 2009, An efficient identity-based online/offline encryption scheme. in M Abdalla, D Pointcheval, P-A Fouque & D Vergnaud (eds), Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009). vol. 5536, Springer, Heidelberg Germany, pp. 156 - 167, International Conference on Applied Cryptography and Network Security 2009, Paris-Rocquencourt, France, 1/01/09. https://doi.org/10.1007/978-3-642-01957-9_10

An efficient identity-based online/offline encryption scheme. / Liu, Joseph K; Zhou, Jianying.

Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009). ed. / Michel Abdalla; David Pointcheval; Pierre-Alain Fouque; Damien Vergnaud. Vol. 5536 Heidelberg Germany : Springer, 2009. p. 156 - 167.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

TY - GEN

T1 - An efficient identity-based online/offline encryption scheme

AU - Liu, Joseph K

AU - Zhou, Jianying

PY - 2009

Y1 - 2009

N2 - In this paper, we present an efficient Identity-based Online / Offline Encryption (IBOOE) scheme. An IBOOE scheme allows one to split the encryption into two phases. In the offline phase, most heavy computations such as exponentiation or pairing, if any, are done in this phase. Yet it does not require the knowledge of the plaintext or the receiver s identity. This nice property allows it can be executed offline , or inside some powerful device. The next phase is called the online phase, where only light computations such as integer addition, multiplication or hashing are needed, together with the plaintext and the receiver s identity. This can be executed inside some embedded device such as smart card or wireless sensor where the computation power is very limited. We propose an efficient IBOOE scheme, with great improvement in the computation requirement of both the offline, online encryption phase and decryption phase, together with much shorten ciphertext over previous schemes. Our scheme can be proven secure in the random oracle model.

AB - In this paper, we present an efficient Identity-based Online / Offline Encryption (IBOOE) scheme. An IBOOE scheme allows one to split the encryption into two phases. In the offline phase, most heavy computations such as exponentiation or pairing, if any, are done in this phase. Yet it does not require the knowledge of the plaintext or the receiver s identity. This nice property allows it can be executed offline , or inside some powerful device. The next phase is called the online phase, where only light computations such as integer addition, multiplication or hashing are needed, together with the plaintext and the receiver s identity. This can be executed inside some embedded device such as smart card or wireless sensor where the computation power is very limited. We propose an efficient IBOOE scheme, with great improvement in the computation requirement of both the offline, online encryption phase and decryption phase, together with much shorten ciphertext over previous schemes. Our scheme can be proven secure in the random oracle model.

UR - http://goo.gl/ZMhQKB

U2 - 10.1007/978-3-642-01957-9_10

DO - 10.1007/978-3-642-01957-9_10

M3 - Conference Paper

SN - 9783642019562

VL - 5536

SP - 156

EP - 167

BT - Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009)

A2 - Abdalla, Michel

A2 - Pointcheval, David

A2 - Fouque, Pierre-Alain

A2 - Vergnaud, Damien

PB - Springer

CY - Heidelberg Germany

ER -

Liu JK, Zhou J. An efficient identity-based online/offline encryption scheme. In Abdalla M, Pointcheval D, Fouque P-A, Vergnaud D, editors, Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009). Vol. 5536. Heidelberg Germany: Springer. 2009. p. 156 - 167 https://doi.org/10.1007/978-3-642-01957-9_10