11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table 10.3: Comparison of HIBE protocols Secure in Generalised Selective-ID Model.<br />

protocol id public max pvt decryption<br />

comp. parameter key size subkey size<br />

H 1 Z p n + h + 3 h + 1 h + 1<br />

H 2 Z p 3 + (n + 1)h h + 1 h + 1<br />

ccHIBE Z ∗ p 4 + nh 2 + n(h − 1) 2<br />

G 2 Z p 3 + (n + 1)h h + 1 + n(h − 1) 2<br />

protocol ciphertext encryption decryption security<br />

expansion efficiency efficiency model<br />

H 1 h + 1 h(n + 1) + 1 h + 1 M 1<br />

H 2 h + 1 h(n + 1) + 1 h + 1 M 2<br />

ccHIBE 2 nh + 2 2 M 2<br />

G 2 2 nh + 2 2 M + 2<br />

For a HIBE of maximum height h, the columns for public parameter, max pvt key size, decryption<br />

subkey size and ciphertext expansion denote the number of elements of G 1 , encryption<br />

efficiency denotes the number of scalar multiplications in G 1 and decryption efficiency<br />

denotes the number of pairing computations.<br />

128

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!