11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

encryption of the message using the symmetric key sym.key. To decrypt, all that we need is<br />

e(P 1 , P 2 ) t = e(d 1 , tP )/e(d 2 , tV ) and then find sym.key using H.<br />

Security: Breaking the (modified) IBE implies either solving OBDH or breaking the<br />

symmetric encryption scheme. The later we assume to be unbreakable under chosen ciphertext<br />

attack. CCA security under the OBDH assumption is expressed in the following<br />

theorem.<br />

Theorem 5.4.1. The modified IBE protocol is (ɛ ibe , t, q)-IND-ID-CCA secure assuming that<br />

the (t ′ , ɛ obdh )-OBDH assumption holds in 〈G 1 , G 2 , e〉, where ɛ ibe ≤ 2ɛ obdh /λ; t ′ = t + O(τq) +<br />

χ(ɛ ibe ), where λ, χ(ɛ ibe ) and τ are as defined in Theorem 5.2.1.<br />

Proof : (Brief sketch) Given a tuple 〈P, aP, bP, cP, str〉, the simulator B has to decide<br />

whether str = H(cP, e(cP, bP ) a ) or str is random. The Setup and key-extraction queries<br />

of both Phase 1 and 2 are just the same as that in the simulation of Theorem 5.2.1. of<br />

Section 5.2.1. Whenever A places any decryption query C = 〈rP, rV, y〉, B queries the<br />

oracle H a () with (rP, P 2 ) and decrypts y using whatever value the oracle returns.<br />

In the Challenge phase, when A submits two messages M 0 , M 1 and an identity v ∗ , B<br />

aborts if S would have aborted under v ∗ in the simulation part of Theorem 5.2.1.. Otherwise<br />

B gives A the tuple C ′ = 〈cP, J(I ∗ )cP, y〉, where y is the encryption of M γ , γ ∈ {0, 1} using<br />

str as the symmetric key. If str is random then C ′ gives no information about B’s choice of<br />

γ. Otherwise C ′ is a valid encryption of M γ .<br />

The rest of the simulation exactly mimics that of Theorem 5.2.1.<br />

Use of OBDH assumption prevents the loss of one level in the conversion from CPA<br />

security to CCA security and does not require any one time signature or MAC as in the<br />

generic conversion discussed in Section 3.5. <strong>Using</strong> the endogenous technique of Boyen, Mei<br />

and Waters [23] we can avoid this MAC or signature. However, it still requires a 2 level<br />

HIBE. On the other hand, OBDH is a stronger assumption than DBDH.<br />

5.5 Signature<br />

It is an observation of Naor that any identity-based encryption scheme can be converted to<br />

a signature scheme. Waters in his paper [89] has given a construction of a signature scheme<br />

based on his IBE scheme. A similar construction is possible for the generalised scheme<br />

IBE-SPP(l) which we detail here. The sketch of the security reduction is provided next.<br />

Let G 1 = 〈P 〉, G 2 and e() be as defined in Section 2.1. Messages are assumed to be<br />

elements of Z N where N = 2 n . Alternatively, if messages are assumed to be bit strings of<br />

arbitrary length, then we use a collision resistant hash function to map the messages into<br />

Z N .<br />

Setup: Choose a random x in Z p and compute P 1 = xP . Next, choose from G 1 random<br />

points P 2 , U ′ , U 1 , . . . , U l . The public key is 〈P, P 1 , P 2 , U ′ , U 1 , . . . , U l 〉 and the secret key is<br />

xP 2 .<br />

59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!