Skip to main content
Log in

An ID-based online/offline signature scheme without random oracles for wireless sensor networks

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Online/offline signature schemes allow one to quickly compute a digital signature from a precomputed coupon. In this paper, we present an ID-based online/offline signature for wireless sensor networks (WSNs), which is based on Hohenberger’ RSA signature (Crypto 09). We argue that due to significant reduction in costs of computation and storage, our scheme is particularly suitable for the WSNs environment with severely constrained resources. Our scheme can be proved secure under the factoring assumption without random oracles.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Huang C, Cheng R-H, Chen S-R, Li C-I (2010) Enhancing network availability by tolerance control in multi-sink wireless sensor networks. J Convergence Sect A-3 1(1):15–22

    Google Scholar 

  2. Ponomarchuk Y, Seo D-W (2010) Intrusion Detection based on Traffic Analysis and Fuzzy Inference System in Wireless Sensor Networks. J Convergence Sect B-1 1(1):35–42

    Google Scholar 

  3. Kumar Dilip, Aseri Trilok C, Patel RB (2011) Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks. Int J Inform Technol Commun Convergence 1(2):130–145

    Article  Google Scholar 

  4. Zhao Gang, Kumar Anup (2011) Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks. Int J Inform Technol Commun Convergence 1(3):297–317

    Article  Google Scholar 

  5. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114

    Article  Google Scholar 

  6. Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53–57

    Article  Google Scholar 

  7. Lopez J, Zhou J (2008) Wireless sensor network security. Volume 1 of cryptology and information security series. IOS Press, Amsterdam

    Google Scholar 

  8. Karlof C, Sastry N, Wagner D (2004) Tinysec: a link layer security architecture for wireless sensor networks. In: Proceedings of ACM SenSys 04, ACM, pp 162–175

  9. Even S, Goldreich O, Micali S (1989) On-line/off-line digital signatures. In: Proceedings of CRYPTO89, volume 2442 of Lecture Notes in Computer Science, Springer, pp 263–277

  10. Shamir A, Tauman Y (2001) Improved online/offline signature schemes. In: Proceedings of CRYPTO01, volume 2139 of Lecture Notes in Computer Science, Springer, pp 355–367

  11. Kurosawa K, Schmidt-Samoa K (2006) New online/offline signature schemes without random oracles. In: Proceedings of PKC06, volume 3958 of Lecture Notes in Computer Science, Springer, pp 330–346

  12. Joye M (2008) An efficient on-line/off-line signature scheme without random oracles. In: Proceedings of CANS08, volume 5339 of Lecture Notes in Computer Science, Springer, pp 98–107

  13. Chen X, Zhang F, Susilo W, Mu Y (2007) Efficient generic online/offline signatures without key exposure. In: Proceedings of ACNS07, volume 4521 of Lecture Notes in Computer Science, Springer, pp 18–30

  14. Boneh D, Boyen X (2008) Short signatures without random oracles the SDH assumption in bilinear groups. J Cryptol 2:149–177

    Article  MathSciNet  Google Scholar 

  15. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 84, volume 196 of Lecture Notes in Computer Science, Springer, p 47C53

  16. Xu S, Mu Y, Susilo W (2006) Online/offline signatures and multisignatures for AVOD and DSR routing security. In: Proceedings of ACISP 06, volume 4058 of Lecture Notes in Computer Science, Springer, p 99C110

  17. Liu JK, Baek J, Zhou J, Yang Y, Wong JW (2010) Efficient online/offline identity-based signature for wireless sensor network. Cryptology ePrint Archive, Report 2010/003 http://eprint.iacr.org

  18. Li F, Shirase M, Takagi T (2008) On the security of online/offline signatures and multisignatures from acisp06. In: Proceedings of CANS 08, volume 5339 of Lecture Notes in Computer Science, Springer, pp 108–119

  19. Hohenberger S, Waters B (2009) Short and stateless signatures from the RSA assumption. In: CRYPTO ’09, volume 5677 of LNCS, pp 654–670

  20. Goldwasser S, Micali S, Rivest RL (1988) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17(2)

  21. Dahmen E, KrauB C (2009) Short hash-based signatures for wireless sensor networks. In: Proceedings of cryptology and network security (CANS09), LNCS 5888, pp 463–476

  22. Boneh D, Lynn B, Shacham H (2004) Short signatures from the Weil pairing. J Cryptol 17(4):297–319

    Article  MathSciNet  MATH  Google Scholar 

  23. Krawczyk H, Rabin T (2000) Chameleon signatures. In: Network and distributed system security symposium

Download references

Acknowledgments

This research is supported by the Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD), the Natural science fund for colleges and universities in Jiangsu Province No. 11KJB520015, the National Natural Science Foundation of China No. 61073188, the China Postdoctoral Science Foundation No.20100471355, and the Program for Excellent Talents in Nanjing University of Posts and Telecommunications No. NY209014.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiwei Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, Z., Chen, W. An ID-based online/offline signature scheme without random oracles for wireless sensor networks. Pers Ubiquit Comput 17, 837–841 (2013). https://doi.org/10.1007/s00779-012-0534-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-012-0534-1

Keywords

Navigation