Practical ID-based encryption for wireless sensor network

Cheng-Kang Chu, Joseph K Liu, Jianying Zhou, Feng Bao, Robert H Deng

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

26 Citations (Scopus)

Abstract

In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity-based Encryption (RB-OOIBE). It splits the encryption process into two parts - the offline and the online part. In the offline part, all heavy computations are done without the knowledge of the receiver s identity and the plaintext message. In the online stage, only light computations such as modular operation and symmetric key encryption are required, together with the receiver s identity and the plaintext message. Moreover, since each offline ciphertext can be re-used for the same receiver, the number of offline ciphertexts the encrypter holds only confines the number of receivers instead of the number of messages to be encrypted. In this way, a sensor node (with limited computation power and limited storage) in WSN can send encrypted data easily: A few offline ciphertexts can be computed in the manufacturing stage while the online part is light enough for the sensor to process.
Original languageEnglish
Title of host publicationProceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010)
EditorsDavid Basin, Peng Liu
Place of PublicationNew York NY USA
PublisherAssociation for Computing Machinery (ACM)
Pages337 - 340
Number of pages4
Volume1
ISBN (Print)9781605589367
DOIs
Publication statusPublished - 2010
Externally publishedYes
EventACM Symposium on Information, Computer and Communication Security (ASIACCS) - Beijing China, New York NY USA
Duration: 1 Jan 2010 → …

Conference

ConferenceACM Symposium on Information, Computer and Communication Security (ASIACCS)
CityNew York NY USA
Period1/01/10 → …

Cite this

Chu, C-K., Liu, J. K., Zhou, J., Bao, F., & Deng, R. H. (2010). Practical ID-based encryption for wireless sensor network. In D. Basin, & P. Liu (Eds.), Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010) (Vol. 1, pp. 337 - 340). New York NY USA: Association for Computing Machinery (ACM). https://doi.org/10.1145/1755688.1755734
Chu, Cheng-Kang ; Liu, Joseph K ; Zhou, Jianying ; Bao, Feng ; Deng, Robert H. / Practical ID-based encryption for wireless sensor network. Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010). editor / David Basin ; Peng Liu. Vol. 1 New York NY USA : Association for Computing Machinery (ACM), 2010. pp. 337 - 340
@inproceedings{6d4f4446477d4f7ea892ae8209b0ba5f,
title = "Practical ID-based encryption for wireless sensor network",
abstract = "In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity-based Encryption (RB-OOIBE). It splits the encryption process into two parts - the offline and the online part. In the offline part, all heavy computations are done without the knowledge of the receiver s identity and the plaintext message. In the online stage, only light computations such as modular operation and symmetric key encryption are required, together with the receiver s identity and the plaintext message. Moreover, since each offline ciphertext can be re-used for the same receiver, the number of offline ciphertexts the encrypter holds only confines the number of receivers instead of the number of messages to be encrypted. In this way, a sensor node (with limited computation power and limited storage) in WSN can send encrypted data easily: A few offline ciphertexts can be computed in the manufacturing stage while the online part is light enough for the sensor to process.",
author = "Cheng-Kang Chu and Liu, {Joseph K} and Jianying Zhou and Feng Bao and Deng, {Robert H}",
year = "2010",
doi = "10.1145/1755688.1755734",
language = "English",
isbn = "9781605589367",
volume = "1",
pages = "337 -- 340",
editor = "David Basin and Peng Liu",
booktitle = "Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010)",
publisher = "Association for Computing Machinery (ACM)",
address = "United States of America",

}

Chu, C-K, Liu, JK, Zhou, J, Bao, F & Deng, RH 2010, Practical ID-based encryption for wireless sensor network. in D Basin & P Liu (eds), Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010). vol. 1, Association for Computing Machinery (ACM), New York NY USA, pp. 337 - 340, ACM Symposium on Information, Computer and Communication Security (ASIACCS), New York NY USA, 1/01/10. https://doi.org/10.1145/1755688.1755734

Practical ID-based encryption for wireless sensor network. / Chu, Cheng-Kang; Liu, Joseph K; Zhou, Jianying; Bao, Feng; Deng, Robert H.

Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010). ed. / David Basin; Peng Liu. Vol. 1 New York NY USA : Association for Computing Machinery (ACM), 2010. p. 337 - 340.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

TY - GEN

T1 - Practical ID-based encryption for wireless sensor network

AU - Chu, Cheng-Kang

AU - Liu, Joseph K

AU - Zhou, Jianying

AU - Bao, Feng

AU - Deng, Robert H

PY - 2010

Y1 - 2010

N2 - In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity-based Encryption (RB-OOIBE). It splits the encryption process into two parts - the offline and the online part. In the offline part, all heavy computations are done without the knowledge of the receiver s identity and the plaintext message. In the online stage, only light computations such as modular operation and symmetric key encryption are required, together with the receiver s identity and the plaintext message. Moreover, since each offline ciphertext can be re-used for the same receiver, the number of offline ciphertexts the encrypter holds only confines the number of receivers instead of the number of messages to be encrypted. In this way, a sensor node (with limited computation power and limited storage) in WSN can send encrypted data easily: A few offline ciphertexts can be computed in the manufacturing stage while the online part is light enough for the sensor to process.

AB - In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity-based Encryption (RB-OOIBE). It splits the encryption process into two parts - the offline and the online part. In the offline part, all heavy computations are done without the knowledge of the receiver s identity and the plaintext message. In the online stage, only light computations such as modular operation and symmetric key encryption are required, together with the receiver s identity and the plaintext message. Moreover, since each offline ciphertext can be re-used for the same receiver, the number of offline ciphertexts the encrypter holds only confines the number of receivers instead of the number of messages to be encrypted. In this way, a sensor node (with limited computation power and limited storage) in WSN can send encrypted data easily: A few offline ciphertexts can be computed in the manufacturing stage while the online part is light enough for the sensor to process.

UR - http://goo.gl/RcMm61

U2 - 10.1145/1755688.1755734

DO - 10.1145/1755688.1755734

M3 - Conference Paper

SN - 9781605589367

VL - 1

SP - 337

EP - 340

BT - Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010)

A2 - Basin, David

A2 - Liu, Peng

PB - Association for Computing Machinery (ACM)

CY - New York NY USA

ER -

Chu C-K, Liu JK, Zhou J, Bao F, Deng RH. Practical ID-based encryption for wireless sensor network. In Basin D, Liu P, editors, Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010). Vol. 1. New York NY USA: Association for Computing Machinery (ACM). 2010. p. 337 - 340 https://doi.org/10.1145/1755688.1755734