11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

model without random oracles. Additionally, we show that CCA security can also be achieved<br />

through the reduction to oracle decision bilinear Diffie-Hellman problem (OBDH).<br />

We note that Naccache [77] has independently obtained a similar construction as of ours<br />

in Section 5.2. Though the construction is similar, the work by Naccache does not perform<br />

any concrete security analysis. In fact, the Naccache work asserts that the loss of security<br />

due to the generalisation is “insignificant”. As discussed in Section 5.3, this is not correct. In<br />

fact, the conversion of security degradation into a trade-off between time and space is original<br />

to our work and is the most important feature of the generalisation of Waters scheme. On<br />

the other hand, we would like to mention that Naccache’s work presents a clearer probability<br />

analysis than that of Waters.<br />

62

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!