11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7.4.2 HIBE H 2<br />

The description of H 2 is similar to that of H 1 . The differences are in the specification of the<br />

public parameters and the definition of the V i ’s.<br />

1. Let (n 1 , . . . , n h ) be a tuple of positive integers.<br />

2. The new public parameters are (P, P 1 , P 2 , −→ P 3 , −→ Q 1 , . . . , −→ Q h ) where −→ P 3 = (P 3,1 , . . . , P 3,h )<br />

and −→ Q i = (Q i,1 , . . . , Q i,ni ). The master secret is αP 2 .<br />

3. Define<br />

V i (y) = y n i<br />

Q i,ni + y n i−1 Q i,ni −1 + . . . + yQ i,1 + P 3,i .<br />

As before V i is used to denote V i (v i ).<br />

With these differences, the rest of set-up, key generation, encryption and decryption algorithms<br />

remain the same.<br />

Note: The HIBE H 1 has the parameters h and n and we will write (h, n)-H 1 to denote<br />

this explicit parametrization. The HIBE H 2 is parametrized by the tuple (n 1 , . . . , n h ) and<br />

we will write (h, n 1 , . . . , n h )-H 2 to denote this parametrization.<br />

7.5 Security Reduction<br />

In this section, we show security reductions for the HIBE protocols.<br />

Recall that the security model M 1 is parametrized as (h, n)-M 1 while model M 2 is<br />

parametrized as (h, n 1 , . . . , n h )-M 2 . The advantage of an adversary in the security game<br />

is denoted by Adv. A subscript to this will denote the model and a superscript will denote<br />

the HIBE for which the result is being stated. For example, Adv (h,n)-H 1<br />

(t, q) denotes the<br />

(h,n)-M 1<br />

maximum advantage of any adversary running in time t and making q queries to O k in<br />

winning the security game defined by (h, n)-M 1 for the HIBE (h, n)-H 1 . We will assume<br />

that one scalar multiplication in G 1 can be done in time O(τ).<br />

7.5.1 Security Reduction for H 1<br />

Theorem 7.5.1. Let h, n, q be positive integers and n ′ be another positive integer with n ′ ≤<br />

n. Then<br />

Adv (h,n)-H 1<br />

(h,n ′ )-M 1<br />

(t, q) ≤ Adv DBDH (t + O(τnq)).<br />

Proof : The security reduction is to show that if there is an adversary which can break H 1<br />

then one obtains an algorithm to solve DBDH. The heart of such an algorithm is a simulator<br />

which is constructed as follows. Given an instance of DBDH as input, the simulator<br />

86

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!