11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

establish the claim. We provide the details. Let Y i be the event that the simulator outputs<br />

1 in Game i, i = 1, 2. Then, we have<br />

|Pr[Y 1 ] − Pr[Y 2 ]| ≤ ɛ dbdh .<br />

Let ab i be the event that the simulator aborts in Game i, i = 1, 2. This includes both<br />

protocol and artificial abort. Following the analysis of [89] and [77], we have<br />

λ − λɛ<br />

2 ≤ Pr[ab i|X i ], Pr[ab i |X i ] ≤ λ + λɛ<br />

2 . (6.3.5)<br />

Here ɛ = ɛ hibe and λ is the lower bound on the probability of not abort up to the artificial<br />

abort stage (see Section 6.3.2).<br />

Pr[Y i ] = Pr[Y i ∧ (ab i ∨ ab i )]<br />

= Pr[(Y i ∧ ab i ) ∨ (Y i ∧ ab i )]<br />

= Pr[Y i ∧ ab i ] + Pr[Y i ∧ ab i ]<br />

= Pr[Y i | ab i ]Pr[ab i ] + Pr[Y i | ab i ]Pr[ab i ]<br />

= 1 2 (1 − Pr[ab i]) + Pr[X i | ab i ]Pr[ab i ]<br />

= 1 2 (1 − Pr[ab i ∧ (X i ∨ X i )]) + Pr[X i ∧ ab i ]<br />

= 1 2 + 1 2<br />

(<br />

Pr[abi |X i ]Pr[X i ] − Pr[ab i |X i ]Pr[X i ] )<br />

Now we need to do some manipulations with inequalities and for convenience we set A i =<br />

Pr[ab i |X i ], B i = Pr[X i ] and C i = Pr[ab i |X i ] and D = Pr[Y 1 ] − Pr[Y 2 ]. We have from (6.3.5)<br />

Also<br />

λ − λɛ<br />

2 ≤ A i, C i ≤ λ + λɛ<br />

2 .<br />

2D = (A 1 B 1 − C 1 (1 − B 1 )) − (A 2 B 2 − C 2 (1 − B 2 )). (6.3.6)<br />

Since both B 1 and (1 − B 1 ) are non-negative, we have<br />

Hence,<br />

B i (λ − λɛ)<br />

≤ A 2 iB i ≤ B i (λ + λɛ)<br />

2<br />

(1 − B i )(−λ − λɛ)<br />

≤ −C 2 i(1 − B i ) ≤ (1 − B i )(−λ + λɛ).<br />

2<br />

λ(2B i − 1) − λɛ<br />

2 ≤ A iB i − C i (1 − B i ) ≤ λ(2B i − 1) + λɛ<br />

2 . (6.3.7)<br />

Putting i = 1 in (6.3.7), we obtain<br />

λ(2B 1 − 1) − λɛ<br />

2 ≤ A 1B 1 − C 1 (1 − B 1 ) ≤ λ(2B 1 − 1) + λɛ<br />

2 . (6.3.8)<br />

70

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!