11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Phase 2: The adversary issues additional queries just as in Phase 1 with the following<br />

restrictions. It cannot ask O d for the decryption of C ∗ under v ∗ ; cannot ask O k for the<br />

private key of any prefix of an identity in S 1 ; and cannot make any useless query.<br />

Guess: The adversary outputs a guess γ ′ of γ.<br />

The adversary’s success is measured as defined in Section 2.5<br />

7.2.1 Full Model<br />

Suppose S 1 = ∅ and S 2 is the set of all identities. By the rules of the game, the adversary<br />

is not allowed to query O k on any identity in S 1 . Since S 1 is empty, this means that the<br />

adversary is actually allowed to query O k on any identity. Further, since S 2 is the set of all<br />

identities, in the challenge stage, the adversary is allowed to choose any identity. In effect,<br />

this means that the adversary does not really commit to anything before set-up and hence,<br />

in this case, the commitment stage can be done away with. This particular choice of S 1 and<br />

S 2 is called the full model (defined in Section 2.5 and is currently believed to be the most<br />

general notion of security for HIBE.<br />

Note that the challenge stage restrictions as well as the restrictions in Phase 2 still apply.<br />

7.2.2 Selective-ID Model<br />

Let S 1 = S 2 be a singleton set. This means that the adversary commits to one particular<br />

identity; does not ask for a private key of any of its prefixes; and in the challenge phase is<br />

given the encryption of M γ under this particular identity. This model is significantly weaker<br />

than the full model and is called the selective-ID model (defined in Section 2.5.3.<br />

7.2.3 New Security Models<br />

We introduce two new security models by suitably defining the sets S 1 and S 2 . In our new<br />

models, (as well as the sID model), we have S 1 = S 2 . (Note that in the full model, S 1 = S 2 .)<br />

Model M 1 : Let I ∗ be a set. Define S 1 = S 2 to be the set of all tuples (v 1 , . . . , v j ), such<br />

that each v i ∈ I ∗ . If the HIBE is of maximum depth h, then 1 ≤ j ≤ h. The length of the<br />

target identity tuple is not fixed by the adversary in the commit phase.<br />

Let us now see what this means. In the commit phase, the adversary commits to a set<br />

I ∗ ; never asks for a private key of an identity all of whose components are in I ∗ ; and during<br />

the challenge phase presents an identity all of whose components are in I ∗ .<br />

Consider the case of IBE, i.e., h = 1, which means that only single component identities<br />

are allowed. Then, we have S 1 = S 2 = I ∗ . Let |I ∗ | = n. If we put n = 1, then we obtain<br />

the sID model for IBE as discussed in Section 7.2.2. In other words, for IBE protocol, M 1<br />

is a strict generalization of sID model.<br />

80

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!