### Practical ID-based Encryption for Wireless Sensor Network

Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, and Robert H. Deng

##### Abstract

In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it \textit{Receiver-Bounded Online/Offline Identity-based Encryption} (RB-OOIBE). It splits the encryption process into two parts -- the offline and the online part. In the offline part, all heavy computations are done without the knowledge of the receiver's identity and the plaintext message. In the online stage, only light computations such as modular operation and symmetric key encryption are required, together with the receiver's identity and the plaintext message. Moreover, since each offline ciphertext can be re-used for the same receiver, the number of offline ciphertexts the encrypter holds only confines the number of receivers instead of the number of messages to be encrypted. In this way, a sensor node (with limited computation power and limited storage) in WSN can send encrypted data easily: A few offline ciphertexts can be computed in the manufacturing stage while the online part is light enough for the sensor to process. We propose an efficient construction for this new notion. The scheme can be proven selective-ID CCA secure in the standard model. Compared to previous online/offline identity-based encryption schemes, our scheme is exempt from a high storage requirement, which is proportional to the number of messages to be sent. The improvement is very significant if many messages are sent to few receivers.

Available format(s)
Category
Public-key cryptography
Publication info
Published elsewhere. An extended abstract of this paper will appear in Asiaccs '10. This is the full version.
Contact author(s)
ckchu @ smu edu sg
History
Short URL
https://ia.cr/2010/002

CC BY

BibTeX

@misc{cryptoeprint:2010/002,
author = {Cheng-Kang Chu and Joseph K.  Liu and Jianying Zhou and Feng Bao and Robert H.  Deng},
title = {Practical ID-based Encryption for Wireless Sensor Network},
howpublished = {Cryptology ePrint Archive, Paper 2010/002},
year = {2010},
note = {\url{https://eprint.iacr.org/2010/002}},
url = {https://eprint.iacr.org/2010/002}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.