Abstract
Online/offline signature schemes allow one to quickly compute a digital signature from a precomputed coupon. In this paper, we present an ID-based online/offline signature for wireless sensor networks (WSNs), which is based on Hohenberger’ RSA signature (Crypto 09). We argue that due to significant reduction in costs of computation and storage, our scheme is particularly suitable for the WSNs environment with severely constrained resources. Our scheme can be proved secure under the factoring assumption without random oracles.
Similar content being viewed by others
References
Huang C, Cheng R-H, Chen S-R, Li C-I (2010) Enhancing network availability by tolerance control in multi-sink wireless sensor networks. J Convergence Sect A-3 1(1):15–22
Ponomarchuk Y, Seo D-W (2010) Intrusion Detection based on Traffic Analysis and Fuzzy Inference System in Wireless Sensor Networks. J Convergence Sect B-1 1(1):35–42
Kumar Dilip, Aseri Trilok C, Patel RB (2011) Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks. Int J Inform Technol Commun Convergence 1(2):130–145
Zhao Gang, Kumar Anup (2011) Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks. Int J Inform Technol Commun Convergence 1(3):297–317
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114
Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53–57
Lopez J, Zhou J (2008) Wireless sensor network security. Volume 1 of cryptology and information security series. IOS Press, Amsterdam
Karlof C, Sastry N, Wagner D (2004) Tinysec: a link layer security architecture for wireless sensor networks. In: Proceedings of ACM SenSys 04, ACM, pp 162–175
Even S, Goldreich O, Micali S (1989) On-line/off-line digital signatures. In: Proceedings of CRYPTO89, volume 2442 of Lecture Notes in Computer Science, Springer, pp 263–277
Shamir A, Tauman Y (2001) Improved online/offline signature schemes. In: Proceedings of CRYPTO01, volume 2139 of Lecture Notes in Computer Science, Springer, pp 355–367
Kurosawa K, Schmidt-Samoa K (2006) New online/offline signature schemes without random oracles. In: Proceedings of PKC06, volume 3958 of Lecture Notes in Computer Science, Springer, pp 330–346
Joye M (2008) An efficient on-line/off-line signature scheme without random oracles. In: Proceedings of CANS08, volume 5339 of Lecture Notes in Computer Science, Springer, pp 98–107
Chen X, Zhang F, Susilo W, Mu Y (2007) Efficient generic online/offline signatures without key exposure. In: Proceedings of ACNS07, volume 4521 of Lecture Notes in Computer Science, Springer, pp 18–30
Boneh D, Boyen X (2008) Short signatures without random oracles the SDH assumption in bilinear groups. J Cryptol 2:149–177
Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 84, volume 196 of Lecture Notes in Computer Science, Springer, p 47C53
Xu S, Mu Y, Susilo W (2006) Online/offline signatures and multisignatures for AVOD and DSR routing security. In: Proceedings of ACISP 06, volume 4058 of Lecture Notes in Computer Science, Springer, p 99C110
Liu JK, Baek J, Zhou J, Yang Y, Wong JW (2010) Efficient online/offline identity-based signature for wireless sensor network. Cryptology ePrint Archive, Report 2010/003 http://eprint.iacr.org
Li F, Shirase M, Takagi T (2008) On the security of online/offline signatures and multisignatures from acisp06. In: Proceedings of CANS 08, volume 5339 of Lecture Notes in Computer Science, Springer, pp 108–119
Hohenberger S, Waters B (2009) Short and stateless signatures from the RSA assumption. In: CRYPTO ’09, volume 5677 of LNCS, pp 654–670
Goldwasser S, Micali S, Rivest RL (1988) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17(2)
Dahmen E, KrauB C (2009) Short hash-based signatures for wireless sensor networks. In: Proceedings of cryptology and network security (CANS09), LNCS 5888, pp 463–476
Boneh D, Lynn B, Shacham H (2004) Short signatures from the Weil pairing. J Cryptol 17(4):297–319
Krawczyk H, Rabin T (2000) Chameleon signatures. In: Network and distributed system security symposium
Acknowledgments
This research is supported by the Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD), the Natural science fund for colleges and universities in Jiangsu Province No. 11KJB520015, the National Natural Science Foundation of China No. 61073188, the China Postdoctoral Science Foundation No.20100471355, and the Program for Excellent Talents in Nanjing University of Posts and Telecommunications No. NY209014.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, Z., Chen, W. An ID-based online/offline signature scheme without random oracles for wireless sensor networks. Pers Ubiquit Comput 17, 837–841 (2013). https://doi.org/10.1007/s00779-012-0534-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-012-0534-1