Abstract
Original language | English |
---|---|
Title of host publication | Proceedings of the 6th International Conference on Information Security and Cryptology (Inscrypt 2010) |
Editors | Xuejia Lai, Moti Yung, Dongdai Lin |
Place of Publication | Heidelberg Germany |
Publisher | Springer |
Pages | 36 - 51 |
Number of pages | 16 |
Volume | 6584 |
ISBN (Print) | 978-364221517-9 |
DOIs | |
Publication status | Published - 2010 |
Externally published | Yes |
Event | International Conference on Information Security and Cryptology (Inscript) 2010 - Shanghai China, Shanghai, China Duration: 20 Oct 2010 → 24 Oct 2010 Conference number: 6th http://www.inscrypt.cn/2010/ |
Conference
Conference | International Conference on Information Security and Cryptology (Inscript) 2010 |
---|---|
Abbreviated title | Inscrypt 2010 |
Country | China |
City | Shanghai |
Period | 20/10/10 → 24/10/10 |
Other | The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010) |
Internet address |
Cite this
}
Online/offline identity-based signcryption revisited. / Liu, Joseph K; Baek, Joonsang; Zhou, Jianying.
Proceedings of the 6th International Conference on Information Security and Cryptology (Inscrypt 2010). ed. / Xuejia Lai; Moti Yung; Dongdai Lin. Vol. 6584 Heidelberg Germany : Springer, 2010. p. 36 - 51.Research output: Chapter in Book/Report/Conference proceeding › Conference Paper › Research › peer-review
TY - GEN
T1 - Online/offline identity-based signcryption revisited
AU - Liu, Joseph K
AU - Baek, Joonsang
AU - Zhou, Jianying
PY - 2010
Y1 - 2010
N2 - In this paper, we redefine a cryptographic notion called Online/Offline Identity-Based Signcryption. It is an online/offline version of identity-based signcryption, where most of the computations are carried out offline while the online part does not require any heavy computations such as pairings or multiplications on elliptic curve. It is particularly suitable for power-constrained devices such as smart cards. We give a concrete implementation of online/offline identity-based signcryption, which is very efficient and flexible. Unlike all the previous schemes in the literature, our scheme does not require the knowledge of receiver s information (either public key or identity) in the offline stage. The receiver s identity and the message to be signcrypted are only needed in the online stage. This feature provides a great flexibility to our scheme and makes it practical to use in real-world applications. To our knowledge, our scheme is the first one in the literature to provide this kind of feature. We prove that the proposed scheme meets strong security requirements in the random oracle model, assuming the Strong Diffie-Hellman (SDH) and Bilinear Diffie-Hellman Inversion (BDHI) are computationally hard.
AB - In this paper, we redefine a cryptographic notion called Online/Offline Identity-Based Signcryption. It is an online/offline version of identity-based signcryption, where most of the computations are carried out offline while the online part does not require any heavy computations such as pairings or multiplications on elliptic curve. It is particularly suitable for power-constrained devices such as smart cards. We give a concrete implementation of online/offline identity-based signcryption, which is very efficient and flexible. Unlike all the previous schemes in the literature, our scheme does not require the knowledge of receiver s information (either public key or identity) in the offline stage. The receiver s identity and the message to be signcrypted are only needed in the online stage. This feature provides a great flexibility to our scheme and makes it practical to use in real-world applications. To our knowledge, our scheme is the first one in the literature to provide this kind of feature. We prove that the proposed scheme meets strong security requirements in the random oracle model, assuming the Strong Diffie-Hellman (SDH) and Bilinear Diffie-Hellman Inversion (BDHI) are computationally hard.
UR - http://link.springer.com/content/pdf/10.1007%2F978-3-642-21518-6_3.pdf
U2 - 10.1007/978-3-642-21518-6_3
DO - 10.1007/978-3-642-21518-6_3
M3 - Conference Paper
SN - 978-364221517-9
VL - 6584
SP - 36
EP - 51
BT - Proceedings of the 6th International Conference on Information Security and Cryptology (Inscrypt 2010)
A2 - Lai, Xuejia
A2 - Yung, Moti
A2 - Lin, Dongdai
PB - Springer
CY - Heidelberg Germany
ER -