11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

generalisation and move on to address the issue of concrete security in the context of this<br />

IBE protocol. To the best of our knowledge, this kind of concrete security analysis in the<br />

IBE scenario was not much emphasised before.<br />

Our next contribution is an extension of this IBE to HIBE. By reusing the public parameters,<br />

we are able to significantly reduce the size of the public parameter. The security<br />

reduction for the HIBE is not tight and suffers from a degradation along the line of the<br />

earlier works in the full model (with or without random oracle). We propose another HIBE<br />

secure in the full model in Chapter 8. This is a variant of constant size ciphertext HIBE<br />

originally proposed by Boneh, Boyen and Goh modified along the line of our generalisation<br />

of Waters suggestion in Chapter 5. In Table 10.1 we make a comparative study of these two<br />

HIBEs with earlier suggestions in the same security model. For all these HIBEs the security<br />

degradation is exponential in the number of levels. Consequently, construction of a HIBE in<br />

the full model where the security degradation is sub-exponential in the number of levels is<br />

an outstanding research problem in this area.<br />

A weaker security model, called the selective-ID model has been suggested in the literature<br />

where it is possible to avoid the security degradation. BB-HIBE and BBG-HIBE are the<br />

only HIBE protocols proposed in this model. We augment this selective-ID security model<br />

by allowing some flexibility to the adversary in choosing the target identity and call this<br />

augmented version selective + -ID model. We show that BB-HIBE can be easily proved to be<br />

secure in s + ID model and modify the original security reduction of BBG-HIBE to achieve<br />

security in this model. The modified reduction of the BBG-HIBE introduces a multiplicative<br />

security degradation. Next, we make some augmentation in the BBG-HIBE to achieve<br />

security in s + ID model without any degradation. This new constant size ciphertext HIBE<br />

secure in the s + ID model is called G 1 . In Table 10.2 we make a comparison of G 1 , BBG-HIBE<br />

and BB-HIBE.<br />

Though the selective-ID model for (H)IBE avoids security degradation, it is too restrictive<br />

on the adversary. This motivated us to propose a generalisation of this model where the<br />

adversary commits to sets of identities. In Chapter 7 we define two models M 1 and M 2<br />

based on the adversarial behavior. Two HIBE protocols H 1 and H 2 secure respectively in<br />

M 1 and M 2 are also suggested. These protocols can be seen as augmentation of the BB-<br />

HIBE. We further propose a constant size ciphertext HIBE called ccHIBE by adapting the<br />

BBG-HIBE in M 2 . Another constant size ciphertext HIBE G 2 secure in the augmented (in<br />

the sense of s + ID model) M 2 is also suggested. A comparative study of these HIBEs is<br />

given in Table 10.3<br />

To conclude, the HIBE protocols proposed in the dissertation broaden the choice of<br />

a designer of identity-based encryption protocols. Several different options of secure and<br />

efficient HIBE protocols are now available to choose from. HIBE as a cryptographic primitive<br />

has several interesting applications. Exploring these applications further based on the HIBEs<br />

proposed here would be an interesting future work.<br />

126

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!