11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The security of FullccHIBE is based on the h-wDBDHI ∗ problem which is obtained by<br />

modifying the BBG-HIBE. For each level of the HIBE we have separate public parameters<br />

P 3,i and (U i,1 , . . . , U i,l ). This makes it possible to easily apply the reasoning of Waters leading<br />

to the above mentioned lower bound.<br />

At this point, we have to also use the technique of “artificial abort” employed by Waters<br />

[89]. The idea is that the probability of aborting up to this is not independent of the<br />

adversarial queries. The idea of the artificial abort technique is to allow the simulator to<br />

sample the transcript of queries it obtained from the adversary and on certain conditions<br />

abort and output a random bit. This increases the total probability of abort and makes it<br />

almost equal for all adversarial inputs. This helps in the probability analysis. The effect of<br />

sampling the transcript is to increase the runtime of the simulator. See [89] for the details.<br />

Incorporating the probability analysis of Waters into the present situation in a straightforward<br />

manner we obtain the required result.<br />

8.4 Conclusion<br />

In this chapter, we have presented two variants of the constant size ciphertext HIBE proposed<br />

by Boneh, Boyen and Goh [19]. Both the constructions have constant size ciphertext<br />

expansion. The first variant is proved to be secure in the generalized selective-ID model M 2<br />

introduced in Chapter 7 while the second variant is secure in the full model. We combine<br />

techniques from several works along with the BBG-HIBE to obtain the new constructions<br />

and their proofs.<br />

105

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!