Identity-Based Encryption Protocols Using Bilinear Pairing
Identity-Based Encryption Protocols Using Bilinear Pairing
Identity-Based Encryption Protocols Using Bilinear Pairing
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Algorithm 2 (iterated doubling):<br />
Input: P = (α, β, 1) in Jacobian coordinates; Q = (x Q , y Q ).<br />
Output: f P (φ(Q)).<br />
1. Set f = 1; g = 1;<br />
2. X = α; Y = β; Z = 1; set R = (X, Y, Z);<br />
3. for j = s − 1 down to 0<br />
4. (f, R) = EncIdbl(f, R, w j );<br />
5. (g, R) = EncAL(R, l j );<br />
6. f = f × g;<br />
7. end for;<br />
8. return f;<br />
end Algorithm 2.<br />
The Subroutine EncAL has already been discussed in Section 4.4.1. We now describe Subroutine<br />
EncIdbl.<br />
Subroutine EncIdbl<br />
Input: R = (X, Y, Z), f and w.<br />
Output: updated f and 2 w+1 R.<br />
1. t 1 = Y 2 ; t 2 = 4Xt 1 ; t 3 = 8t 2 1; t 4 = Z 2 ; w = aZ 4 ; t 5 = 3X 2 + w;<br />
2. A = −(2t 1 + t 5 (t 4 x Q − X)); X = t 2 5 − 2t 2 ;<br />
Y = t 5 (t 2 − X) − t 3 ; Z = 2Y Z; B = Zt 4 y Q ;<br />
3. f = f 2 × (A + iB);<br />
4. for j = 1 to w do<br />
5. w = 2t 3 w; t 1 = Y 2 ; t 2 = 4Xt 1 ; t 3 = 8t 2 1; t 4 = Z 2 ; t 5 = 3X 2 + w;<br />
6. A = −(2t 1 + t 5 (t 4 x Q − X)); X = t 2 5 − 2t 2 ;<br />
Y = t 5 (t 2 − X) − t 3 ; Z = 2Y Z; B = Zt 4 y Q ;<br />
7. f = f 2 × (A + iB);<br />
8. end for;<br />
9. R = (X, Y, Z);<br />
9. return (f, R);<br />
end Subroutine EncIdbl.<br />
Algorithm 2 is essentially the same as Algorithm 1 except for the use of iterated doubling.<br />
The technique of iterated doubling is considered to reduce computation cost but does not<br />
affect the correctness of the algorithm. We consider the cost of the algorithm. As before let<br />
the Hamming weight of r t−1 , . . . , r 0 be s.<br />
• Steps 5 and 6 of Algorithm 2 are invoked s times. The total cost of these two steps is<br />
s(14[M]+3[S]).<br />
• Step 4 of Algorithm 2 is invoked a total of s times. The cost of the jth invocation of<br />
Step 4 is computed as follows:<br />
– Cost of Steps 3 and 7 in EncIdbl is 5[M].<br />
44