Identity-Based Encryption Protocols Using Bilinear Pairing
Identity-Based Encryption Protocols Using Bilinear Pairing
Identity-Based Encryption Protocols Using Bilinear Pairing
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Table 10.1: Comparison of HIBE <strong>Protocols</strong> Secure in Full Model.<br />
Protocol PP size Pvt. Key size CT size <strong>Pairing</strong><br />
(elts. of G 1 ) (elts. of G 1 ) (elts. of G 1 ) Enc. Dec.<br />
GS [49] 2 j j 1 j<br />
Waters [89] (n + 1)h + 3 j + 1 j + 1 None j + 1<br />
HIBE-spp h + l + 3 j + 1 j + 1 None j + 1<br />
FullccHIBE (l + 1)h + 3 (l + 1)(h − 1) + 2 2 None 2<br />
The columns for Pvt. Key size, ciphertext (CT) size and pairing in decryption corresponds<br />
to an identity at a level j, 1 ≤ j ≤ h. The GS-HIBE uses random oracle in the security<br />
reduction while the other three do not.<br />
Table 10.2: Comparison of HIBE protocols Secure in sID/s + ID Model.<br />
protocol security id public max pvt decryption<br />
model comp parameter key size subkey size<br />
G 1 s + ID Z p 3 + 2h 2h 2<br />
BBG s + ID Z ∗ p 4 + h h + 1 2<br />
BBG sID Z ∗ p 4 + h h + 1 2<br />
BB s + ID Z p 3 + h h + 2 h + 2<br />
protocol ciphertext encryption decryption Security<br />
expansion efficiency efficiency degradation<br />
G 1 2 h + 2 2 Nil<br />
BBG in s + ID 2 h + 2 2 h<br />
BBG in sID 2 h + 2 2 Nil<br />
BB h + 1 2h + 1 h + 1 Nil<br />
For a HIBE of maximum height h, the columns for public parameter, max pvt key size, decryption<br />
subkey size and ciphertext expansion denote the number of elements of G 1 , encryption<br />
efficiency denotes the number of scalar multiplications in G 1 and decryption efficiency<br />
denotes the number of pairing computations.<br />
127