Security

Identity-Based Online/Offline Key Encapsulation and Encryption

Download Now Free registration required

Executive Summary

An Identity-Based Online/Offline Encryption (IBOOE) scheme splits the encryption process into two phases. The first phase performs most of the heavy computations, such as modular exponentiation or pairing over points on elliptic curve. The knowledge of the plaintext or the receiver's identity is not required until the second phase, where the ciphertext is produced by only light computations, such as integer addition/multiplication or hashing. This division of computations makes encryption affordable by devices with limited computation power since the preparation works can be executed "Offine" or possibly by some powerful devices.

  • Format: PDF
  • Size: 378.8 KB