Sciweavers

CCS
2010
ACM

Practical ID-based encryption for wireless sensor network

14 years 6 months ago
Practical ID-based encryption for wireless sensor network
In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity-based Encryption (RB-OOIBE). It splits the encryption process into two parts – the offline and the online part. In the offline part, all heavy computations are done without the knowledge of the receiver’s identity and the plaintext message. In the online stage, only light computations such as modular operation and symmetric key encryption are required, together with the receiver’s identity and the plaintext message. Moreover, since each offline ciphertext can be re-used for the same receiver, the number of offline ciphertexts the encrypter holds only confines the number of receivers instead of the number of messages to be encrypted. In this way, a sensor node (with limited computation power and limited storage) in WSN can send encrypted data easily: A few offline ciphertexts can be computed in the man...
Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng
Added 18 May 2010
Updated 18 May 2010
Type Conference
Year 2010
Where CCS
Authors Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng
Comments (0)