11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table 10.1: Comparison of HIBE <strong>Protocols</strong> Secure in Full Model.<br />

Protocol PP size Pvt. Key size CT size <strong>Pairing</strong><br />

(elts. of G 1 ) (elts. of G 1 ) (elts. of G 1 ) Enc. Dec.<br />

GS [49] 2 j j 1 j<br />

Waters [89] (n + 1)h + 3 j + 1 j + 1 None j + 1<br />

HIBE-spp h + l + 3 j + 1 j + 1 None j + 1<br />

FullccHIBE (l + 1)h + 3 (l + 1)(h − 1) + 2 2 None 2<br />

The columns for Pvt. Key size, ciphertext (CT) size and pairing in decryption corresponds<br />

to an identity at a level j, 1 ≤ j ≤ h. The GS-HIBE uses random oracle in the security<br />

reduction while the other three do not.<br />

Table 10.2: Comparison of HIBE protocols Secure in sID/s + ID Model.<br />

protocol security id public max pvt decryption<br />

model comp parameter key size subkey size<br />

G 1 s + ID Z p 3 + 2h 2h 2<br />

BBG s + ID Z ∗ p 4 + h h + 1 2<br />

BBG sID Z ∗ p 4 + h h + 1 2<br />

BB s + ID Z p 3 + h h + 2 h + 2<br />

protocol ciphertext encryption decryption Security<br />

expansion efficiency efficiency degradation<br />

G 1 2 h + 2 2 Nil<br />

BBG in s + ID 2 h + 2 2 h<br />

BBG in sID 2 h + 2 2 Nil<br />

BB h + 1 2h + 1 h + 1 Nil<br />

For a HIBE of maximum height h, the columns for public parameter, max pvt key size, decryption<br />

subkey size and ciphertext expansion denote the number of elements of G 1 , encryption<br />

efficiency denotes the number of scalar multiplications in G 1 and decryption efficiency<br />

denotes the number of pairing computations.<br />

127

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!