11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

∑u ′<br />

(<br />

= γ cj P + vjY ∗ h−j+1 + vj(β ∗ j P − Y h−j+1 ) )<br />

j=1<br />

∑u ′<br />

( )<br />

= γ P3,j + vjQ ∗ j<br />

= γ<br />

j=1<br />

( u ′<br />

)<br />

∑<br />

V j .<br />

j=1<br />

If the input provided to B is a true h-wDBDHI ∗ tuple, i.e., T = e(P, Q) (αh+1) , then<br />

T × e(Y 1 , βQ) = e(P, Q) (αh+1) × e(Y 1 , βQ) = e(Y h + βP, Q) α = e(P 1 , P 2 ) γ .<br />

So, the challenge ciphertext is<br />

(<br />

CT =<br />

M b × e(P 1 , P 2 ) γ , γP, γ<br />

( u ′<br />

))<br />

∑<br />

V j .<br />

CT is a valid encryption of M b under v + = (v1, ∗ . . . , vu ∗ ′). On the other hand, when T is<br />

random, CT is random from the view point of A.<br />

j=1<br />

Phase 2:<br />

2 together.<br />

This is similar to Phase 1. Note that A places at most q queries in Phase 1 and<br />

Guess: Finally, A outputs its guess b ′ ∈ {0, 1}. B outputs 1 ⊕ b ⊕ b ′ .<br />

A’s view in the above simulation is identical to that in a real attack. This gives us the<br />

required bound on the advantage of the adversary in breaking the HIBE protocol.<br />

9.4 Augmenting to M + 2<br />

Like the augmentation of the selective-ID model to selective + -ID model, we can augment<br />

M 2 proposed in Chapter 7 in an obvious way to M + 2 . Suppose the adversary of an h-HIBE<br />

has committed to a set of target identities, I ∗ 1, . . . , I ∗ u where u ≤ h. Then in the challenge<br />

phase it outputs a target identity v ∗ 1, . . . , v ∗ u ′ where 1 ≤ u′ ≤ u and each v ∗ j ∈ I ∗ j .<br />

The HIBE H 2 proposed in Chapter 7 is also secure in M + 2 . ccHIBE of Chapter 8 secure<br />

in M 2 can be proved to be secure in M + 2 with a multiplicative security degradation of h.<br />

Here, we show how G 1 can be augmented to M + 2 .<br />

9.4.1 Construction<br />

We augment G 1 to obtain security in model M + 2 and call this new protocol (h, n 1 , . . . , n h )-G 2<br />

or simply G 2 .<br />

115

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!