11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Algorithm 2 (iterated doubling):<br />

Input: P = (α, β, 1) in Jacobian coordinates; Q = (x Q , y Q ).<br />

Output: f P (φ(Q)).<br />

1. Set f = 1; g = 1;<br />

2. X = α; Y = β; Z = 1; set R = (X, Y, Z);<br />

3. for j = s − 1 down to 0<br />

4. (f, R) = EncIdbl(f, R, w j );<br />

5. (g, R) = EncAL(R, l j );<br />

6. f = f × g;<br />

7. end for;<br />

8. return f;<br />

end Algorithm 2.<br />

The Subroutine EncAL has already been discussed in Section 4.4.1. We now describe Subroutine<br />

EncIdbl.<br />

Subroutine EncIdbl<br />

Input: R = (X, Y, Z), f and w.<br />

Output: updated f and 2 w+1 R.<br />

1. t 1 = Y 2 ; t 2 = 4Xt 1 ; t 3 = 8t 2 1; t 4 = Z 2 ; w = aZ 4 ; t 5 = 3X 2 + w;<br />

2. A = −(2t 1 + t 5 (t 4 x Q − X)); X = t 2 5 − 2t 2 ;<br />

Y = t 5 (t 2 − X) − t 3 ; Z = 2Y Z; B = Zt 4 y Q ;<br />

3. f = f 2 × (A + iB);<br />

4. for j = 1 to w do<br />

5. w = 2t 3 w; t 1 = Y 2 ; t 2 = 4Xt 1 ; t 3 = 8t 2 1; t 4 = Z 2 ; t 5 = 3X 2 + w;<br />

6. A = −(2t 1 + t 5 (t 4 x Q − X)); X = t 2 5 − 2t 2 ;<br />

Y = t 5 (t 2 − X) − t 3 ; Z = 2Y Z; B = Zt 4 y Q ;<br />

7. f = f 2 × (A + iB);<br />

8. end for;<br />

9. R = (X, Y, Z);<br />

9. return (f, R);<br />

end Subroutine EncIdbl.<br />

Algorithm 2 is essentially the same as Algorithm 1 except for the use of iterated doubling.<br />

The technique of iterated doubling is considered to reduce computation cost but does not<br />

affect the correctness of the algorithm. We consider the cost of the algorithm. As before let<br />

the Hamming weight of r t−1 , . . . , r 0 be s.<br />

• Steps 5 and 6 of Algorithm 2 are invoked s times. The total cost of these two steps is<br />

s(14[M]+3[S]).<br />

• Step 4 of Algorithm 2 is invoked a total of s times. The cost of the jth invocation of<br />

Step 4 is computed as follows:<br />

– Cost of Steps 3 and 7 in EncIdbl is 5[M].<br />

44

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!