11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

decreases. However, the security of the HIBE degrades as l decreases. Hence, the decrease<br />

in the size of the public parameters comes at an increase in the security degradation. This<br />

trade-off can be converted into a trade-off between the memory required to store the public<br />

parameters and the time required for the different operations. This space/time trade-off<br />

has been studied in details in Chapter 5. A similar space/time trade-off also holds for the<br />

present case.<br />

8.3.1 Construction<br />

Setup: Choose a random secret α ∈ Z p and set P 1 = αP . Randomly choose P 2 ; an h-<br />

length vector −→ P 3 = (P 3,1 , . . . , P 3,h ); and h many l-length vectors −→ U 1 , . . . , −→ U h from G 1 , where<br />

each −→ U j = (U j,1 , . . . , U j,l ). The public parameters consist of the elements<br />

〈P, P 1 , P 2 , −→ P 3 , −→ U 1 , . . . , −→ U h 〉<br />

while the master secret is αP 2 . Note that, for each level i of the HIBE we have l +1 elements<br />

i.e., P 3,i and −→ U i .<br />

Notation: Let v j be an n-bit string written as v j = (v j,1 , . . . , v j,l ), where each v j,i is an<br />

(n/l)-bit string. Define<br />

l∑<br />

V j = P 3,j + v j,i U j,i .<br />

The modularity introduced by this notation is useful in describing the protocol.<br />

Key-Gen: Given an identity v = (v 1 , . . . , v k ) for k ≤ h, this algorithm generates the<br />

private key d v of v as follows. Choose a random element r ∈ Z p and output<br />

⎛ ⎛ ⎞<br />

⎞<br />

k∑<br />

d v = ⎝xP 2 + r ⎝ V j<br />

⎠ , rP, rP 3,k+1 , . . . , rP 3,h , r −→ U k+1 , . . . , r −→ U h<br />

⎠<br />

j=1<br />

where r −→ U j = (rU j,1 , . . . , rU j,l ).<br />

Note that, the private key for v can also be generated from the private key of (v 1 , . . . , v k−1 )<br />

as is the general requirement for a HIBE scheme. Suppose the private key for (v 1 , . . . , v k−1 )<br />

is (d ′ 0, d ′ 1, a ′ k , . . . , a′ h , −→ b ′ k , . . . , −→ b ′ h), where −→ b ′ i = 〈b ′ i,1, . . . , b ′ i,l 〉. Pick a random r′ ∈ Z p and then<br />

d v = (d 0 , d 1 , a k+1 , . . . , a h , −→ b k+1 , . . . , −→ b h ), where<br />

i=1<br />

and for k + 1 ≤ j ≤ h.<br />

d 0 = d ′ 0 + a ′ k + ∑ l<br />

i=1 v k,ib ′ k,i + r′ ∑ k<br />

j=1 V j;<br />

d 1 = d ′ 1 + r ′ P ;<br />

a j = a ′ j + r ′ P 3,j ;<br />

−→<br />

bj = −→ b ′ j + r ′ −→<br />

Uj ,<br />

101

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!