Skip to main content
Log in

Efficient online/offline identity-based signature for wireless sensor network

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

In this paper, we present an online/offline identity-based signature scheme for the wireless sensor network (WSN). We argue that due to significant reduction in costs of computation and storage, our scheme is particularly suitable for the WSN environment with severely constrained resources. One of the interesting features of our scheme is that it provides multi-time usage of the offline storage, which allows the signer to re-use the offline pre-computed information in polynomial time, in contrast to one-time usage in all previous online/offline signature schemes. As evidence of the practicality and feasibility of our scheme to be used in the WSN environment, we provide an actual implementation result of our scheme on the MicaZ platform.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Akyildiz I.F., Su W., Sankarasubramaniam Y., Cayirci E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)

    Article  Google Scholar 

  2. Baek, J., Tan, H., Zhou, J., Wong J.: Realizing stateful public key encryption in wireless sensor network. In: Proc. IFIP-SEC ’08, pp. 95–108. Springer, Boston (2008)

  3. Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Proc. EUROCRYPT ’04, vol. 3027. Lecture Notes in Computer Science, pp. 268–286. Springer, New York (2004)

  4. Boneh D., Boyen X.: Short signatures without random oracles the SDH assumption in bilinear groups. J. Cryptol. 2, 149–177 (2008)

    Article  MathSciNet  Google Scholar 

  5. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Proc. CRYPTO 2001, vol. 2139. Lecture Notes in Computer Science, pp. 213–229. Springer, Berlin (2001)

  6. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Proc. ASIACRYPT ’01, vol. 2248. Lecture Notes in Computer Science, pp. 514–532. Springer, New York (2001)

  7. Cha, J., Cheon, J.: An identity-based signature from gap Diffie-Hellman groups. In: Proc. PKC’2003, vol. 2567. Lecture Notes in Computer Science, pp. 18–30. Springer, Berlin (2003)

  8. Chen, X., Zhang F., Susilo W., Mu, Y.: Efficient generic online/offline signatures without key exposure. In: Proc. ACNS ’07, vol. 4521. Lecture Notes in Computer Science, pp. 18–30. Springer, Berlin (2007)

  9. Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. In: Proc. CRYPTO ’89, vol. 2442. Lecture Notes in Computer Science, pp. 263–277. Springer, New York (1989)

  10. Gaubatz, G., Kaps, J.-P., Oztruk, E., Sunar, B.: State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Proc. PerSec ’05, pp. 146–150. IEEE (2005)

  11. Guillou, L.C., Quisquater, J.-J.: A “Paradoxical” Identity-based signature scheme resulting from zero-knowledge. In: Proc. CRYPTO 88, vol. 403. Lecture Notes in Computer Science, pp. 216–231. Springer, Berlin (1989)

  12. Hess, F.: Efficient identity based signature schemes based on pairings. In: Selected area in cryptography, SAC2002, vol. 2595. Lecture Notes in Computer Science, pp. 310–324. Springer, Berlin (2003)

  13. Joye, M.: An efficient on-line/off-line signature scheme without random oracles. In: Proc. CANS ’08, vol. 5339. Lecture Notes in Computer Science, pp. 98–107. Springer, Berlin (2008)

  14. Karlof, C., Sastry, N., Wagner, D.: Tinysec: A link layer security architecture for wireless sensor networks. In: Proc. ACM SenSys~’04, pp. 162–175. ACM, Baltimore (2004)

  15. Kurosawa, K., Schmidt-Samoa, K.: New online/offline signature schemes without random oracles. In: Proc. PKC ’06, vol. 3958. Lecture Notes in Computer Science, pp. 330–346. Springer, Berlin (2006)

  16. Liu, A., Ning, P.: TinyECC—A configurable library for elliptic curve cryptography in wireless sensor networks (Version 1.0). Cyber Defense Laboratory, NCSU. http://discovery.csc.ncsu.edu/software/TinyECC/ (2007)

  17. Li, F., Shirase, M., Takagi, T.: On the security of online/offline signatures and multisignatures from acisp’06. In: Proc. CANS ’08, vol. 5339. Lecture Notes in Computer Science, pp. 108–119. Springer, Berlin 2008

  18. Lopez J., Zhou J.: Wireless sensor network security, vol. 1. Cryptology and Information Security Series. IOS Press, Amsterdam (2008)

    Google Scholar 

  19. Oliveira, L.B., Scott, M., Lopez, J., Dahab, R.: TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. Cryptology ePrint Archive, Report 2007/482. http://eprint.iacr.org/ (2007)

  20. Perrig A., Stankovic J., Wagner D.: Security in wireless sensor networks. Commun ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  21. Roma, R., Alcaraz, C.: Applicability of public key infrastructures in wireless sensor networks. In: Proc. EuroPKI ’07, vol. 4582. Lecture Notes in Computer Science, pp. 313–320. Springer, Berlin (2007)

  22. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proc. CRYPTO ’84, vol. 196. Lecture Notes in Computer Science, pp. 47–53. Springer, Berlin (1984)

  23. Shamir, A., Tauman, Y.: Improved online/offline signature schemes. In: Proc. CRYPTO ’01, vol. 2139. Lecture Notes in Computer Science, pp. 355–367. Springer, Berlin (2001)

  24. SMEPP. Secure middleware for embedded P2P systems, 2006 to present. http://www.smepp.org

  25. Tan, C., Wang, H., Zhong, S., Li, Q.: Body sensor network security: An identity-based cryptography approach. In: Proc. 1st ACM conference on Wireless Network Security, pp. 148–153. ACM, Virginia (2008)

  26. Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.: Energy analysis of public-key cryptography for wireless sensor networks. In: Proc. PerCom ’05, pp. 324–328. IEEE Computer Society, New York (2005)

  27. Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: Securing sensor networks with public key technology. In: Proc. 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 59–64. ACM, Washington, DC (2004)

  28. Xu, S., Mu, Y., Susilo W.: Online/offline signatures and multisignatures for AVOD and DSR routing security. In: Proc. ACISP ’06, vol. 4058. Lecture Notes in Computer Science, pp. 99–110. Springer, Berlin (2006)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianying Zhou.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, J.K., Baek, J., Zhou, J. et al. Efficient online/offline identity-based signature for wireless sensor network. Int. J. Inf. Secur. 9, 287–296 (2010). https://doi.org/10.1007/s10207-010-0109-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-010-0109-y

Keywords

Navigation