Autosoft Journal

Online Manuscript Access

Identity Based On-Line/Off-Line Signature With Designated Verifier



It0027s necessary to equip WSNs with authentication mechanism accounts for that the nodes of WSNs are vulnerable to various attacks since they are open and resource-limited. However, the traditional authentication such as signature cannot be utilized to achieve this goal, because of its heavy computation. On-line/off-line signature can be considered as a practical solution for authentication WSNs, because the WSNs nodes only need to perform lightweight on-line sign, while the heavy computation can be performed off-sign phase using efficient computational devices, but it is not perfect for certain circumstances. For example, the signer unwilling to expose the message of the signatures, such as personal health records, to others. How to achieve confidence and efficiency simultaneously remains a problem for WSNs. In this paper, we present a strong designated on-line/off-line signature scheme for WSNs, which can ensure the confidence as well as security simultaneously. The proposed scheme is proven to be secure under the BDH assumption and its computation cost is acceptable for the nodes of WNSs.



Total Pages: 11
Pages: 433-443


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways

Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Volume: 21
Issue: 3
Year: 2015

Cite this document


Chow, Sherman S. M., Joseph K. Liu, and Jianying Zhou. "Identity-Based Online/offline Key Encapsulation and Encryption." Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS ”11 (2011): n. pag. Crossref. Web.

Even, Shimon, Oded Goldreich, and Silvio Micali. "On-Line/Off-Line Digital Signatures." Lecture Notes in Computer Science 263-275. Crossref. Web.

Guo, Fuchun, Yi Mu, and Zhide Chen. "Identity-Based Online/Offline Encryption." Lecture Notes in Computer Science 247-261. Crossref. Web.

Jakobsson, Markus, Kazue Sako, and Russell Impagliazzo. "Designated Verifier Proofs and Their Applications." Lecture Notes in Computer Science (1996): 143-154. Crossref. Web.

Jayaprakash K. International Journal of Network Security

Kambourakis, Georgios, Stefanos Gritzalis, and Jong Hyuk Park. "Device Authentication In Wireless And Pervasive Environments." Intelligent Automation & Soft Computing 16.3 (2010): 399-418. Crossref. Web.

Kurosawa, Kaoru, and Katja Schmidt-Samoa. "New Online/Offline Signature Schemes Without Random Oracles." Lecture Notes in Computer Science (2006): 330-346. Crossref. Web.

LaguillaumieF. & VergnaudD. (2005). Designated verifier signatures: Anonymity and efficient construction from any bilinear map. In C.Blundo & S.Cimato (Eds.), LNCS. SCN 2004, Amalfi, Italy, September 8–10, (Vol. 3352, pp. 105–119). Heidelberg: Springer.

LewisF. (2004). Wireless sensor networks. Smart environments: Technologies, protocols, and applications. New York, NY: John Wiley.

LipmaaH., WangG. & BaoF. (2005). Designated verifier signature schemes: Attacks, new security notions and a new construction. In LNCS. ICALP, Lisbon, Portugal, July 11–15, (Vol. 3580, pp. 459–471). Heidelberg: Springer.

Shaikha R. Intelligent Automation & Soft Computing

Shamir, Adi. "Identity-Based Cryptosystems and Signature Schemes." Lecture Notes in Computer Science 47-53. Crossref. Web.

Shamir, Adi, and Yael Tauman. "Improved Online/Offline Signature Schemes." Lecture Notes in Computer Science (2001): 355-367. Crossref. Web.

SelviS. S. D., VivekS. S. & RanganC. P. (2010). Identity based online/offline signcryption scheme. IACR Cryptology Print Archive, 2010, Report No. 376.

Shim, Kyung-Ah. "On Delegatability of Designated Verifier Signature Schemes." Information Sciences 281 (2014): 365-372. Crossref. Web.

Sim, Inbo, and Jaiyong Lee. "Routing Protocol With Scalability, Energy Efficiency And Reliability In WSN." Intelligent Automation & Soft Computing 16.4 (2010): 567-577. Crossref. Web.

Sun, Dongdong et al. "Identity-Based On-Line/Off-Line Signcryption." 2008 IFIP International Conference on Network and Parallel Computing (2008): n. pag. Crossref. Web.

Xu, Feng, and Xuan Liu. "Authentication Scheme for Cluster-Structured Ad Hoc Network." Intelligent Automation & Soft Computing 19.2 (2013): 123-131. Crossref. Web.

Yang, Junmo, and Sang-Hun Jung. "The Case Study Of System Architecture In Wireless Sensor Networks: The Kindergarten Safety System (Kss)." Intelligent Automation & Soft Computing 16.4 (2010): 507-517. Crossref. Web.

Yasmin R. IEICE Transactions

Zhang, Rui, Jun Furukawa, and Hideki Imai. "Short Signature and Universal Designated Verifier Signature Without Random Oracles." Lecture Notes in Computer Science (2005): 483-498. Crossref. Web.

Zhang, Rui, Jun Furukawa, and Hideki Imai. "Short Signature and Universal Designated Verifier Signature Without Random Oracles." Lecture Notes in Computer Science (2005): 483-498. Crossref. Web.


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048