Identity-Based Encryption Protocols Using Bilinear Pairing
Identity-Based Encryption Protocols Using Bilinear Pairing
Identity-Based Encryption Protocols Using Bilinear Pairing
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Contents<br />
1 Introduction 1<br />
1.1 Plan of the Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4<br />
2 Preliminaries 7<br />
2.1 <strong>Bilinear</strong> Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7<br />
2.2 Hardness Assumption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8<br />
2.2.1 <strong>Bilinear</strong> Diffie-Hellman Assumption . . . . . . . . . . . . . . . . . . . 8<br />
2.2.2 Variants of BDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9<br />
2.3 Public Key <strong>Encryption</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11<br />
2.4 <strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong> <strong>Protocols</strong> . . . . . . . . . . . . . . . . . . . . . . 12<br />
2.4.1 Hierarchical <strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong> . . . . . . . . . . . . . . . . . 13<br />
2.5 Security Model of (H)IBE . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14<br />
2.5.1 Security Against Chosen Ciphertext Attack . . . . . . . . . . . . . . 14<br />
2.5.2 Security Against Chosen Plaintext Attack . . . . . . . . . . . . . . . 15<br />
2.5.3 Selective-ID Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16<br />
3 Previous Works in <strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong> 18<br />
3.1 <strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br />
3.1.1 Hierarchical <strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong> . . . . . . . . . . . . . . . . . 23<br />
3.2 From Random Oracle to Standard Model . . . . . . . . . . . . . . . . . . . . 25<br />
3.2.1 Selective-ID Secure HIBE . . . . . . . . . . . . . . . . . . . . . . . . 25<br />
3.3 Full Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br />
3.3.1 Waters’ Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29<br />
3.4 HIBE with Shortened Ciphertext . . . . . . . . . . . . . . . . . . . . . . . . 31<br />
3.4.1 Constant Size Ciphertext HIBE . . . . . . . . . . . . . . . . . . . . . 31<br />
3.5 Chosen Ciphertext Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 32<br />
3.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35<br />
4 Tate <strong>Pairing</strong> in General Characteristic Fields 36<br />
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36<br />
4.2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37<br />
v