SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

To provide better overall performance, identity (ID)-based signcryption (IBSC) has been constructed by combining ID-based signature (IBS) and ID-based encryption (IBE) in a secure manner. Undoubtedly, the IBSC fulfills the authentication and the confidentiality by signature and encryption, respectively. All the previously proposed IBSC schemes are inseparable in the sense that the two-layer sign-then-encrypt procedure must be performed only by the same entity. However, the entities, such as wireless sensors and smart cards, are resource-constrained and become time consuming in executing the two-layer sign-then-encrypt procedure. Nowadays, the usage of mobile cloud computing is gaining expanding interest which provides scalable and virtualized services over the Internet or wireless networks while users with resource-constrained devices can enjoy the advantages of mobile cloud computing environments. Hence, we aim to reduce the computational cost for resource-constrained devices by employing a third party. In this article, we present the first separable ID-based signcryption (SIBSC) scheme in which the signing and encrypting layers are performed by the device and a third party, respectively. Under the computation Diffie-Hellman (CDH) and bilinear Diffie-Hellman (BDH) assumptions, we demonstrate that the proposed SIBSC scheme offers the provable security of authentication and confidentiality while retaining communication performance.

Original languageEnglish
Pages (from-to)193-214
Number of pages22
JournalInformatica (Netherlands)
Volume28
Issue number1
DOIs
Publication statusPublished - 2017 Jan 1

Fingerprint

Mobile cloud computing
Signcryption
Identity-based
Authentication
Cryptography
Resources
Smart cards
Mobile Computing
Diffie-Hellman
Confidentiality
Wireless networks
Cloud Computing
Internet
Identity-based Signature
Communication
Sensors
Provable Security
Identity-based Encryption
Smart Card
Wireless Sensors

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Applied Mathematics

Cite this

@article{68b40fc9f0f74bfa9d67b283a9ac8d75,
title = "SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices",
abstract = "To provide better overall performance, identity (ID)-based signcryption (IBSC) has been constructed by combining ID-based signature (IBS) and ID-based encryption (IBE) in a secure manner. Undoubtedly, the IBSC fulfills the authentication and the confidentiality by signature and encryption, respectively. All the previously proposed IBSC schemes are inseparable in the sense that the two-layer sign-then-encrypt procedure must be performed only by the same entity. However, the entities, such as wireless sensors and smart cards, are resource-constrained and become time consuming in executing the two-layer sign-then-encrypt procedure. Nowadays, the usage of mobile cloud computing is gaining expanding interest which provides scalable and virtualized services over the Internet or wireless networks while users with resource-constrained devices can enjoy the advantages of mobile cloud computing environments. Hence, we aim to reduce the computational cost for resource-constrained devices by employing a third party. In this article, we present the first separable ID-based signcryption (SIBSC) scheme in which the signing and encrypting layers are performed by the device and a third party, respectively. Under the computation Diffie-Hellman (CDH) and bilinear Diffie-Hellman (BDH) assumptions, we demonstrate that the proposed SIBSC scheme offers the provable security of authentication and confidentiality while retaining communication performance.",
author = "Tsai, {Tung Tso} and Huang, {Sen Shan} and Tseng, {Yuh Min}",
year = "2017",
month = "1",
day = "1",
doi = "10.15388/Informatica.2017.126",
language = "English",
volume = "28",
pages = "193--214",
journal = "Informatica",
issn = "0868-4952",
publisher = "IOS Press",
number = "1",

}

SIBSC : Separable Identity-Based Signcryption for Resource-Constrained Devices. / Tsai, Tung Tso; Huang, Sen Shan; Tseng, Yuh Min.

In: Informatica (Netherlands), Vol. 28, No. 1, 01.01.2017, p. 193-214.

Research output: Contribution to journalArticle

TY - JOUR

T1 - SIBSC

T2 - Separable Identity-Based Signcryption for Resource-Constrained Devices

AU - Tsai, Tung Tso

AU - Huang, Sen Shan

AU - Tseng, Yuh Min

PY - 2017/1/1

Y1 - 2017/1/1

N2 - To provide better overall performance, identity (ID)-based signcryption (IBSC) has been constructed by combining ID-based signature (IBS) and ID-based encryption (IBE) in a secure manner. Undoubtedly, the IBSC fulfills the authentication and the confidentiality by signature and encryption, respectively. All the previously proposed IBSC schemes are inseparable in the sense that the two-layer sign-then-encrypt procedure must be performed only by the same entity. However, the entities, such as wireless sensors and smart cards, are resource-constrained and become time consuming in executing the two-layer sign-then-encrypt procedure. Nowadays, the usage of mobile cloud computing is gaining expanding interest which provides scalable and virtualized services over the Internet or wireless networks while users with resource-constrained devices can enjoy the advantages of mobile cloud computing environments. Hence, we aim to reduce the computational cost for resource-constrained devices by employing a third party. In this article, we present the first separable ID-based signcryption (SIBSC) scheme in which the signing and encrypting layers are performed by the device and a third party, respectively. Under the computation Diffie-Hellman (CDH) and bilinear Diffie-Hellman (BDH) assumptions, we demonstrate that the proposed SIBSC scheme offers the provable security of authentication and confidentiality while retaining communication performance.

AB - To provide better overall performance, identity (ID)-based signcryption (IBSC) has been constructed by combining ID-based signature (IBS) and ID-based encryption (IBE) in a secure manner. Undoubtedly, the IBSC fulfills the authentication and the confidentiality by signature and encryption, respectively. All the previously proposed IBSC schemes are inseparable in the sense that the two-layer sign-then-encrypt procedure must be performed only by the same entity. However, the entities, such as wireless sensors and smart cards, are resource-constrained and become time consuming in executing the two-layer sign-then-encrypt procedure. Nowadays, the usage of mobile cloud computing is gaining expanding interest which provides scalable and virtualized services over the Internet or wireless networks while users with resource-constrained devices can enjoy the advantages of mobile cloud computing environments. Hence, we aim to reduce the computational cost for resource-constrained devices by employing a third party. In this article, we present the first separable ID-based signcryption (SIBSC) scheme in which the signing and encrypting layers are performed by the device and a third party, respectively. Under the computation Diffie-Hellman (CDH) and bilinear Diffie-Hellman (BDH) assumptions, we demonstrate that the proposed SIBSC scheme offers the provable security of authentication and confidentiality while retaining communication performance.

UR - http://www.scopus.com/inward/record.url?scp=85018734414&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85018734414&partnerID=8YFLogxK

U2 - 10.15388/Informatica.2017.126

DO - 10.15388/Informatica.2017.126

M3 - Article

AN - SCOPUS:85018734414

VL - 28

SP - 193

EP - 214

JO - Informatica

JF - Informatica

SN - 0868-4952

IS - 1

ER -