11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents<br />

1 Introduction 1<br />

1.1 Plan of the Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4<br />

2 Preliminaries 7<br />

2.1 <strong>Bilinear</strong> Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7<br />

2.2 Hardness Assumption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8<br />

2.2.1 <strong>Bilinear</strong> Diffie-Hellman Assumption . . . . . . . . . . . . . . . . . . . 8<br />

2.2.2 Variants of BDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9<br />

2.3 Public Key <strong>Encryption</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11<br />

2.4 <strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong> <strong>Protocols</strong> . . . . . . . . . . . . . . . . . . . . . . 12<br />

2.4.1 Hierarchical <strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong> . . . . . . . . . . . . . . . . . 13<br />

2.5 Security Model of (H)IBE . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14<br />

2.5.1 Security Against Chosen Ciphertext Attack . . . . . . . . . . . . . . 14<br />

2.5.2 Security Against Chosen Plaintext Attack . . . . . . . . . . . . . . . 15<br />

2.5.3 Selective-ID Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16<br />

3 Previous Works in <strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong> 18<br />

3.1 <strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br />

3.1.1 Hierarchical <strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong> . . . . . . . . . . . . . . . . . 23<br />

3.2 From Random Oracle to Standard Model . . . . . . . . . . . . . . . . . . . . 25<br />

3.2.1 Selective-ID Secure HIBE . . . . . . . . . . . . . . . . . . . . . . . . 25<br />

3.3 Full Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br />

3.3.1 Waters’ Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29<br />

3.4 HIBE with Shortened Ciphertext . . . . . . . . . . . . . . . . . . . . . . . . 31<br />

3.4.1 Constant Size Ciphertext HIBE . . . . . . . . . . . . . . . . . . . . . 31<br />

3.5 Chosen Ciphertext Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 32<br />

3.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35<br />

4 Tate <strong>Pairing</strong> in General Characteristic Fields 36<br />

4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36<br />

4.2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37<br />

v

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!