11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

previous chapter. The second variant (called FullccHIBE) is secure in the full model. Like<br />

BBG-HIBE, both are proved secure without random oracle.<br />

In Chapter 9, we augment the selective-ID security model for HIBE by allowing the<br />

adversary some flexibility in choosing the target identity tuple during the challenge phase of<br />

the security reduction. We denote this model by selective + -ID model (s + ID model). We show<br />

that the HIBE proposed by Boneh-Boyen [17] satisfies this notion of security. The case of the<br />

constant size ciphertext HIBE of Boneh, Boyen and Goh is different – the original reduction<br />

in [19] can be modified to achieve this goal where security degrades by a multiplicative factor<br />

of the number of levels in the HIBE. Further we modify the BBG-HIBE to construct a new<br />

protocol called G 1 , secure in s + ID model without any degradation. G 1 maintains all the<br />

attractive features of BBG-HIBE. We build on this new construction another constant size<br />

ciphertext HIBE G 2 . The security of G 2 is proved under the augmented version of M 2 . Our<br />

third construction in this chapter is a “product” HIBE G 3 that allows a controllable trade-off<br />

between the ciphertext size and the private key size.<br />

We conclude the dissertation by summing-up our contributions in Chapter 10. We also<br />

mention some open problems in the area.<br />

6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!