Skip to main content
Log in

Efficient identity-based online/offline encryption and signcryption with short ciphertext

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

The technique of online/offline is regarded as a promising approach to speed up the computation of encryption, because the most part of computation, such as pairing over points on elliptic curve and exponentiation in groups, can be pre-computed in the offline phase without knowing the message to be encrypted and/or recipient’s identity. The online phase only requires light computation, such as modular multiplication. In this paper, we propose two novel identity-based online/offline schemes: a full secure identity-based online/offline encryption scheme and an identity-based online/offline signcryption scheme. Compared to the other schemes in the literature, our schemes achieve the shortest ciphertext size in both offline and online phases and demonstrate the best performance in offline computation. Our schemes are applicable to devices with limited computation power. They are proven secure in the random oracle model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Paulo, S., Barreto, L.M., Libert, B.: Noel McCullagh, and Jean-Jacques Quisquater. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, pp. 515–532 (2005)

  2. Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Advances in Cryptology-EUROCRYPT 2004, Lecture Notes in Computer Science, vol. 3027, pp. 223–238. (2004)

  3. Boneh, D., Boyen, X.: Short signatures without random oracles. In: Proceedings of Advances in Cryptology-Eurocrypt 2004, Lecture Notes in Computer Science, vol. 3027, pp. 56–73. (2004)

  4. Boyen, X.: Multipurpose identity-based signcryption. In: Advances in Cryptology-CRYPTO 2003, Lecture Notes in Computer Science, vol. 2729, pp. 383–399. (2003)

  5. Chen, L., Cheng, Z.: Security proof of sakai-kasahara’s identity-based encryption scheme. In: Cryptography and Coding 2005, Lecture Notes in Computer Science, vol. 3796, pp. 442–459. (2005)

  6. Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Public Key Cryptography-PKC 2005, Lecture Notes in Computer Science, vol. 3386, pp. 362–379. (2005)

  7. Chow, S.S.M., Liu, J.K., Zhou, J.: Identity-based online/offline key encapsulation and encryption. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS’11, pp. 52–60. (2011)

  8. Chu, C-K., Liu, J.K., Zhou, J., Bao, F., Deng, R.H.: Practical ID-based encryption for wireless sensor network. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS’10, pp. 337–340. (2010)

  9. Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. J. Cryptol. 9(1), 35–67 (1996)

  10. Gentry, C.: Practical identity-based encryption without random oracles. In: Advances in Cryptology-EUROCRYPT 2006, Lecture Notes in Computer Science, vol. 4004, pp. 445–464. (2006)

  11. Guo, F., Mu, Y., Chen, Z.: Identity-based online/offline encryption. In: Financial Cryptography and Data Security, Lecture Notes in Computer Science, vol. 5143, pp. 247–261. (2008)

  12. Lai, J., Mu, Y., Guo, F., Susilo, W.: Improved identity-based online/offline encryption. In: ACISP 2015, Lecture Notes in Computer Science, vol. 9144, pp. 160–173. (2015)

  13. Li, F., Khan, M.K., Alghathbar, K., Takagi, T.: Identity-based online/offline signcryption for low power devices. J. Netw. Comput. Appl. 35(1), 340–347 (2012)

    Article  Google Scholar 

  14. Liu, J.K., Baek, J., Zhou, J.: Online/offline identity-based signcryption revisited. In: Proceedings of the Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science, vol. 6584, pp. 36–51. (2011)

  15. Liu, J.K., Zhou, J.: An efficient identity-based online/offline encryption scheme. In: Applied Cryptography and Network Security, Lecture Notes in Computer Science ACNS’09, vol. 5536, pp. 156–167. (2009)

  16. Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)

    Article  MATH  Google Scholar 

  17. Selvi, S.S.D., Vivek, S.S, Rangan, C.P: Identity based online/offline encryption scheme. Cryptology ePrint archive, report 2010/178, (2010)

  18. Selvi, S.S.D, Vivek, S.S, Rangan, C.P.: Identity based online/offline encryption and signcryption schemes revisited. In: Security Aspects in Information Technology, Lecture Notes in Computer Science, vol. 7011, pp. 111–127. (2011)

  19. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology-CRYPTO 1984, Lecture Notes in Computer Science, vol. 196, pp. 47–53. (1985)

  20. Sun, D., Huang, X., Mu, Y., Susilo, W.: Identity based online/offline signcryption. In: Network and Parallel Computing Workshops, Lecture Notes in Computer Science, vol. 5245, pp. 34–41. (2008)

  21. Sun, D., Mu, Y., Susilo, W.: A generic construction of identity-based online/offline signcryption. In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA’08, pp. 707–712. (2008)

  22. Waters, B.: Efficient identity-based encryption without random oracles. In: Advances in Cryptology-EUROCRYPT 2005, Lecture Notes in Computer Science, vol. 3494, pp. 114–127 (2005)

  23. Waters, B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Advances in Cryptology-CRYPTO 2009, Lecture Notes in Computer Science, vol. 5677, pp. 619–636. (2009)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianchang Lai.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lai, J., Mu, Y. & Guo, F. Efficient identity-based online/offline encryption and signcryption with short ciphertext. Int. J. Inf. Secur. 16, 299–311 (2017). https://doi.org/10.1007/s10207-016-0320-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-016-0320-6

Keywords

Navigation