11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Y h . So B can compute all these ˜rV j s from the information it has. It forms<br />

d 0 = d 0|k +<br />

∑<br />

j∈{1,...,h ′ }\{k}<br />

∑h ′<br />

˜rV j = αP 2 + ˜r V j .<br />

To form a valid private key, B also needs to compute ˜rP 3,i and ˜r −→ Q i for h ′ < i ≤ h. Now,<br />

)<br />

˜rP 3,i =<br />

(r − αk<br />

(b i,0 P + a i,0 Y h−i+1 )<br />

F k (v k )<br />

= r(b i,0 P + a i,0 Y h−i+1 ) − 1<br />

F k (v k ) (b i,0Y k + a j,0 Y h+k−i+1 ) ;<br />

)<br />

˜rQ i,j =<br />

(r − αk<br />

(b i,j P + a i,j Y h−i+1 )<br />

F k (v k )<br />

= r(b i,j P + a i,j Y h−i+1 ) − 1<br />

F k (v k ) (b i,jY k + a i,j Y h+k−i+1 ) .<br />

All these values are computable from what is known to B. Hence, B forms the private key<br />

as:<br />

d v =<br />

(d 0 , d 1 , ˜rP 3,τ+1 , . . . , ˜rP 3,h , ˜r −→ Q τ+1 , . . . , ˜r −→ )<br />

Q h<br />

and provides it to A.<br />

Challenge: After completion of Phase 1, A outputs two messages M 0 , M 1 ∈ G 2 together<br />

with a target identity v ∗ = (v1, ∗ . . . , vu ∗ ′), u′ ≤ u, on which it wishes to be challenged. The<br />

constraint is each vj ∗ ∈ Ij ∗ and hence F j (vj) ∗ = 0 for 1 ≤ j ≤ u ′ ≤ u. B picks a random<br />

b ∈ {0, 1} and provides A the challenge ciphertext<br />

CT =<br />

(<br />

M b × T × e(Y 1 , βQ), Q,<br />

Suppose, Q = γP for some unknown γ ∈ Z p . Then<br />

∑u ′<br />

j=1<br />

( u ′<br />

j=1<br />

) )<br />

∑<br />

J i (vi ∗ ) × Q .<br />

i=1<br />

∑u ′<br />

( )<br />

J j (vj)Q ∗ = γ Jj (vj)P ∗ + F j (vj)Y ∗ h−j+1<br />

= γ<br />

j=1<br />

( u ′<br />

)<br />

∑<br />

V j .<br />

j=1<br />

If the input provided to B is a true h-wDBDHI ∗ tuple, i.e., T = e(P, Q) (αh+1) , then<br />

T × e(Y 1 , βQ) = e(P, Q) (αh+1) × e(Y 1 , βQ) = e(Y h + βP, Q) α = e(P 1 , P 2 ) γ .<br />

119

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!