11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Hence,<br />

This shows<br />

A =<br />

=<br />

∑n i<br />

l=1<br />

v l iQ i,l + b i,0 P + a i,0 Y h−i+1<br />

= V i + b i,0 P + a i,0 Y h−i+1 .<br />

j∑<br />

V i +<br />

i=1<br />

= P 3 +<br />

h∑<br />

(b i,0 P + a i,0 Y h−i+1 )<br />

i=1<br />

j∑<br />

V i .<br />

i=1<br />

d 0 = αP 2 + r ′ (P 3 +<br />

)<br />

j∑<br />

V i<br />

where ˜r = r − (α k /F k (v k )). Since r is random, so is ˜r and hence d 0 is properly formed. Also,<br />

i=1<br />

d 1 = − 1<br />

F k (v k ) Y k + rP = −<br />

αk<br />

P + rP = ˜rP<br />

F k (v k )<br />

which is as required. To form a valid private key ˜r −→ Q i has to be computed for j < i ≤ h.<br />

This is done as follows.<br />

)<br />

˜rQ i,l =<br />

(r − αk<br />

(b i,l P + a i,l Y h−i+1 )<br />

F k (v k )<br />

= r(b i,l P + a i,l Y h−i+1 ) − 1<br />

F k (v k ) (b i,lY k + a i,l Y h+k−i+1 ) .<br />

Thus, we get<br />

d v =<br />

(d 0 , d 1 , ˜r −→ Q j+1 , . . . , ˜r −→ Q h<br />

)<br />

.<br />

Challenge: After completion of Phase 1, the adversary outputs two messages M 0 , M 1 ∈ G 2<br />

together with a target identity v ∗ = (v1, ∗ . . . , vu) ∗ on which it wishes to be challenged. The<br />

constraint is each vi ∗ ∈ Ii ∗ and hence F i (vi ∗ ) ≡ 0 mod p for 1 ≤ i ≤ u. If u ≤ h, then<br />

a j,0 = 0 for u ≤ j ≤ h. The simulator picks a random b ∈ {0, 1} and constructs the challenge<br />

ciphertext (<br />

( u∑<br />

) )<br />

h∑<br />

M b × T × e(Y 1 , βQ), Q, J i (vi ∗ ) + b i,0 Q .<br />

i=1<br />

i=u+1<br />

Suppose, Q = γP for some unknown γ ∈ Z p . <strong>Using</strong> the fact F i (vi ∗ ) ≡ 0 mod p for 1 ≤ i ≤ u<br />

and a i,0 = 0 for u + 1 ≤ i ≤ h, we have<br />

( u∑<br />

) (<br />

h∑<br />

u∑<br />

)<br />

h∑<br />

J i (vi ∗ ) + b i,0 Q = γ (J i (vi ∗ )P + F i (vi ∗ )Y h−i+1 ) + (a i,0 Y h−i+1 + b i,0 P )<br />

i=1<br />

i=u+1<br />

i=1<br />

i=u+1<br />

99

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!