11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

For u + 1 ≤ i ≤ h choose a random non-zero element a i,0 from Z p and define F i (x) = a i,0 .<br />

Note that F i (x) is a non-zero constant polynomial. For 1 ≤ i ≤ u, define a i,n ′<br />

i<br />

= 1 and<br />

a i,ni = · · · = a i,n ′<br />

i +1 = 0; for u + 1 ≤ i ≤ h, set n ′ i = 0 and a i,1 = · · · = a i,ni = 0.<br />

For 1 ≤ i ≤ h and 1 ≤ j ≤ n i choose random elements b i,j from Z p . Define<br />

J i (x) = b i,ni x n i<br />

+ b i,ni −1x n i−1 + · · · + b i,1 x + b i,0 .<br />

Note that F i (x) is of degree n ′ i while J i (x) is of degree n i .<br />

The public parameters are defined as follows.<br />

• For 1 ≤ i ≤ h, define P 3,i = a i,0 P 2 + b i,0 P .<br />

• For 1 ≤ i ≤ h and 1 ≤ j ≤ n i define Q i,j = a i,j P 2 + b i,j P .<br />

Since the b i,j s are chosen randomly, the distribution of the public parameters is random. We<br />

now show the decomposition of V i (y).<br />

V i (y) = P 3,i + yQ i,1 + y 2 Q i,2 + · · · + y n i<br />

Q i,ni<br />

= (a i,0 P 2 + b i,0 P ) + y(a i,1 P 2 + b i,1 P ) + y 2 (a i,2 P 2 + b i,2 P ) + · · · + y n i<br />

(a i,ni P 2 + b i,ni P )<br />

= (a i,0 + a i,1 y + a i,2 y 2 + · · · + a i,ni y n i<br />

)P 2 + (b i,0 + b i,1 y + b i,2 y 2 + · · · + b i,ni y n i<br />

)P<br />

= F i (y)P 2 + J i (y)P.<br />

The rest of the simulation is very similar to that in the proof of Theorem 7.5.1.. Also, the<br />

bound on the advantage follows as in the above mentioned proof.<br />

The proof shows that (h, n 1 , . . . , n h )-H 2 is secure in model (h, n ′ 1, . . . , n ′ h )-M 2 with n ′ i ≤<br />

n i . Recall that (h, 1, . . . , 1)-M 2 is same as the h-sID model and hence (h, n 1 , . . . , n h )-H 2 is<br />

secure in the h-sID model.<br />

7.6 Multi-Receiver IBE<br />

A multi-receiver IBE (MR-IBE) is an extension of the IBE, which allows a sender to encrypt<br />

a message in such a way that it can be decrypted by any one of a particular set of identities.<br />

In other words, there is one encryptor but more than one valid receivers. In IBE, the number<br />

of valid receivers is one. One trivial way to realize an MR-IBE from an IBE is to encrypt<br />

the same message several times. A non-trivial construction attempts to reduce the cost of<br />

encryption.<br />

This notion was introduced in [4] and a non-trivial construction based on the Boneh-<br />

Franklin IBE (BF-IBE) was provided. The construction was proved to be secure in the<br />

selective-ID model using random oracle assumption. Note that the BF-IBE is secure in the<br />

full model using random oracle.<br />

We show that H 1 restricted to IBE can be modified to obtain an MR-IBE. The situation<br />

for H 2 is almost identical. The required modifications to the protocol are as follows.<br />

91

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!