SlideShare a Scribd company logo
1 of 11
Download to read offline
IBE发展现状
   关志
   Guanzhi@infosec.pku.edu.cn
   2007年7月24日




2007-7-24           Identity Based Encryption   1
四个基本的IBE体制

    Boneh-Franklin IBE                        2001





    Cocks IBE                                 2001





    Boneh-Boyen IBE                           2004





    Heng-Kurosawa IBE                         2004




2007-7-24         Identity Based Encryption          2
IBE的扩展

    层次IBE





    支持通配符的IBE





    模糊IBE





    …




2007-7-24   Identity Based Encryption   3
IBE体制

    IBE体制由四个部分构成



            系统建立:生成公开系统参数和主密钥
     



            私钥生成:由用户标识和主密钥导出用户私钥
     



            加密:由用户标识加密
     



            解密:由用户私钥解密
     




2007-7-24         Identity Based Encryption   4
Pairing基本概念

    Pairing(双线性映射)e: G1×G1 →G2,#G1=# G2 =p。



    满足如下性质:



            双线性(Bilinearity)
     


                <aP, bQ> = <aP, Q>b=<P, bQ>a=<P, Q>ab
            


            非退化(Non-degenerate)
     


                对于任意P和Q,不全都映射到的单位元上
            


            运算效率满足应用需求。
     



2007-7-24                     Identity Based Encryption   5
Pairing的进展

    新的Pairing类型



            Weil Pairing
     


            Tate Pairing
     


            Ate Pairing
     



    新的适用于Pairing的椭圆曲线



            超奇异椭圆曲线
     


            MNT椭圆曲线
     




2007-7-24                   Identity Based Encryption   6
Pairing 密码基础
    Pairing和离散对数问题的相似性


            <aP, Q>b=<P, bQ>a =<P, Q>ab
     

             (ga)b = (gb)a = gab
     




    由Pairing构造的Diffie-Hellman密钥交换


            P,Q为G1上的公开点,A (a, aP),B (b, bP)
     

            A发送aP给B
     

            B发送bP给A
     

            A计算共享密钥<bP, Q>a =(<P, Q>b) a =<P, Q>ab
     

            B计算共享密钥<aP, Q>b =(<P, Q>a) b =<P, Q>ab
     



2007-7-24                      Identity Based Encryption   7
Boneh-Franklin IBE
    系统主密钥:整数s


    公开的参数:椭圆曲线点sP,


    接收方私钥:椭圆曲线点sQID


    接收方公钥:QID=Map-to-point(ID)


    加密:选择一个随机数 r∈Zq* ,明文 M 对


    应的密文C={U,V}={rP, M⨁ 〈QID, sP〉r}
    解密:M=V⨁〈sQID, rP〉





2007-7-24        Identity Based Encryption   8
密钥长度对比

            Bits of                       Pairing
                       ECC (CPK)                        RSA
            Security                     (BF-IBE)
              80         160                 512        1024
              112        224                1024        2048
              128        256                1536        3072
              192        384                3840        7680
              256        512                7680        15360


2007-7-24                   Identity Based Encryption           9
效率对比




            BF-IBE @ 512bit ECC,
            512bit ECC : 160bit ECC = 9:1
2007-7-24            Identity Based Encryption   10
实现

    Stanford PBC





    Voltage IBE





    Shamus MIRCAL





2007-7-24          Identity Based Encryption   11

More Related Content

What's hot

دندان پزشکی در سعادت اباد
دندان پزشکی در سعادت اباددندان پزشکی در سعادت اباد
دندان پزشکی در سعادت ابادmohammaddoge
 
IPV9人类共同的理想/IPv9 - The common ideal for human being
IPV9人类共同的理想/IPv9 - The common ideal for human beingIPV9人类共同的理想/IPv9 - The common ideal for human being
IPV9人类共同的理想/IPv9 - The common ideal for human beingshizhao
 
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプトdevsumi2009
 
كيف تكسب مهارة التركيز
كيف تكسب مهارة التركيزكيف تكسب مهارة التركيز
كيف تكسب مهارة التركيزAhmed Zeen EL Abeden
 
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M JaletaU casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M JaletaCIMMYT
 
JARIR BOOKSTORE Lowprice
JARIR BOOKSTORE LowpriceJARIR BOOKSTORE Lowprice
JARIR BOOKSTORE Lowpricegueste54184
 
Marketing kotler1
Marketing kotler1Marketing kotler1
Marketing kotler1fanoos2000
 
Ar To Eng General Sample
Ar To Eng General SampleAr To Eng General Sample
Ar To Eng General Sampleguest719aad
 

What's hot (17)

دندان پزشکی در سعادت اباد
دندان پزشکی در سعادت اباددندان پزشکی در سعادت اباد
دندان پزشکی در سعادت اباد
 
It Flyer Page08
It Flyer Page08It Flyer Page08
It Flyer Page08
 
IPV9人类共同的理想/IPv9 - The common ideal for human being
IPV9人类共同的理想/IPv9 - The common ideal for human beingIPV9人类共同的理想/IPv9 - The common ideal for human being
IPV9人类共同的理想/IPv9 - The common ideal for human being
 
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
 
Book ridrog kotokatha (1st volume)
Book ridrog kotokatha (1st volume)Book ridrog kotokatha (1st volume)
Book ridrog kotokatha (1st volume)
 
كيف تكسب مهارة التركيز
كيف تكسب مهارة التركيزكيف تكسب مهارة التركيز
كيف تكسب مهارة التركيز
 
Lec 4 07
Lec 4 07Lec 4 07
Lec 4 07
 
Chocolate
ChocolateChocolate
Chocolate
 
Lec 1 07
Lec 1 07Lec 1 07
Lec 1 07
 
Lec 5 07
Lec 5 07Lec 5 07
Lec 5 07
 
Lec 2 07
Lec 2 07Lec 2 07
Lec 2 07
 
Lec 3 07
Lec 3 07Lec 3 07
Lec 3 07
 
از ایده تا اجرا
از ایده تا اجرااز ایده تا اجرا
از ایده تا اجرا
 
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M JaletaU casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
 
JARIR BOOKSTORE Lowprice
JARIR BOOKSTORE LowpriceJARIR BOOKSTORE Lowprice
JARIR BOOKSTORE Lowprice
 
Marketing kotler1
Marketing kotler1Marketing kotler1
Marketing kotler1
 
Ar To Eng General Sample
Ar To Eng General SampleAr To Eng General Sample
Ar To Eng General Sample
 

Viewers also liked

An Overview of Identity Based Encryption
An Overview of Identity Based EncryptionAn Overview of Identity Based Encryption
An Overview of Identity Based EncryptionVertoda System
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based EncryptionPratik Poddar
 
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTINGNexgen Technology
 
Vertoda wind farmoperations
Vertoda wind farmoperationsVertoda wind farmoperations
Vertoda wind farmoperationsVertoda System
 
CPK Theory And Parctice
CPK Theory And ParcticeCPK Theory And Parctice
CPK Theory And ParcticeZhi Guan
 
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsIdentity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsShakas Technologies
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingPvrtechnologies Nellore
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingCloudTechnologies
 

Viewers also liked (8)

An Overview of Identity Based Encryption
An Overview of Identity Based EncryptionAn Overview of Identity Based Encryption
An Overview of Identity Based Encryption
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
 
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 
Vertoda wind farmoperations
Vertoda wind farmoperationsVertoda wind farmoperations
Vertoda wind farmoperations
 
CPK Theory And Parctice
CPK Theory And ParcticeCPK Theory And Parctice
CPK Theory And Parctice
 
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsIdentity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applications
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 

Similar to A Survey of Identity-Based Encryption

다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...Amazon Web Services Korea
 
Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证Chui-Wen Chiu
 
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...taeseon ryu
 
095722121-期中報告-UGC
095722121-期中報告-UGC095722121-期中報告-UGC
095722121-期中報告-UGCcherish0906
 
Metadaily80131
Metadaily80131Metadaily80131
Metadaily80131arefnet
 
Lecture of Design of PKUPI
Lecture of Design of PKUPILecture of Design of PKUPI
Lecture of Design of PKUPIrealfish Qian
 
Heap overflow
Heap overflowHeap overflow
Heap overflow@x0mg
 
CRE-016-商業智慧
CRE-016-商業智慧CRE-016-商業智慧
CRE-016-商業智慧handbook
 
Revisiting the Sibling Head in Object Detector
Revisiting the Sibling Head in Object DetectorRevisiting the Sibling Head in Object Detector
Revisiting the Sibling Head in Object DetectorSungchul Kim
 
Web-based IPTV Service (Beyond IPTV)
Web-based IPTV Service (Beyond IPTV)Web-based IPTV Service (Beyond IPTV)
Web-based IPTV Service (Beyond IPTV)Seungyun Lee
 
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟taiwanweb20
 
Richard Databoard
Richard DataboardRichard Databoard
Richard Databoard巍 陆
 

Similar to A Survey of Identity-Based Encryption (13)

다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
 
Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证
 
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
 
095722121-期中報告-UGC
095722121-期中報告-UGC095722121-期中報告-UGC
095722121-期中報告-UGC
 
產品簡介
產品簡介產品簡介
產品簡介
 
Metadaily80131
Metadaily80131Metadaily80131
Metadaily80131
 
Lecture of Design of PKUPI
Lecture of Design of PKUPILecture of Design of PKUPI
Lecture of Design of PKUPI
 
Heap overflow
Heap overflowHeap overflow
Heap overflow
 
CRE-016-商業智慧
CRE-016-商業智慧CRE-016-商業智慧
CRE-016-商業智慧
 
Revisiting the Sibling Head in Object Detector
Revisiting the Sibling Head in Object DetectorRevisiting the Sibling Head in Object Detector
Revisiting the Sibling Head in Object Detector
 
Web-based IPTV Service (Beyond IPTV)
Web-based IPTV Service (Beyond IPTV)Web-based IPTV Service (Beyond IPTV)
Web-based IPTV Service (Beyond IPTV)
 
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
 
Richard Databoard
Richard DataboardRichard Databoard
Richard Databoard
 

More from Zhi Guan

USB Token Design and Implementation
USB Token Design and ImplementationUSB Token Design and Implementation
USB Token Design and ImplementationZhi Guan
 
CPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisCPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisZhi Guan
 
Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical PasswordsZhi Guan
 
CPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump SessionCPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump SessionZhi Guan
 
Ph D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityPh D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityZhi Guan
 
Red Office Documents Security Proposal
Red Office Documents Security ProposalRed Office Documents Security Proposal
Red Office Documents Security ProposalZhi Guan
 
ICDCS‘08 WebIBC
ICDCS‘08 WebIBCICDCS‘08 WebIBC
ICDCS‘08 WebIBCZhi Guan
 
Crypto With OpenSSL
Crypto With OpenSSLCrypto With OpenSSL
Crypto With OpenSSLZhi Guan
 
Code Signing with CPK
Code Signing with CPKCode Signing with CPK
Code Signing with CPKZhi Guan
 

More from Zhi Guan (10)

USB Token Design and Implementation
USB Token Design and ImplementationUSB Token Design and Implementation
USB Token Design and Implementation
 
CPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisCPK Cryptosystem In Solaris
CPK Cryptosystem In Solaris
 
Easy CPK
Easy CPKEasy CPK
Easy CPK
 
Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical Passwords
 
CPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump SessionCPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump Session
 
Ph D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityPh D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing Security
 
Red Office Documents Security Proposal
Red Office Documents Security ProposalRed Office Documents Security Proposal
Red Office Documents Security Proposal
 
ICDCS‘08 WebIBC
ICDCS‘08 WebIBCICDCS‘08 WebIBC
ICDCS‘08 WebIBC
 
Crypto With OpenSSL
Crypto With OpenSSLCrypto With OpenSSL
Crypto With OpenSSL
 
Code Signing with CPK
Code Signing with CPKCode Signing with CPK
Code Signing with CPK
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

A Survey of Identity-Based Encryption

  • 1. IBE发展现状 关志 Guanzhi@infosec.pku.edu.cn 2007年7月24日 2007-7-24 Identity Based Encryption 1
  • 2. 四个基本的IBE体制 Boneh-Franklin IBE 2001  Cocks IBE 2001  Boneh-Boyen IBE 2004  Heng-Kurosawa IBE 2004  2007-7-24 Identity Based Encryption 2
  • 3. IBE的扩展 层次IBE  支持通配符的IBE  模糊IBE  …  2007-7-24 Identity Based Encryption 3
  • 4. IBE体制 IBE体制由四个部分构成  系统建立:生成公开系统参数和主密钥  私钥生成:由用户标识和主密钥导出用户私钥  加密:由用户标识加密  解密:由用户私钥解密  2007-7-24 Identity Based Encryption 4
  • 5. Pairing基本概念 Pairing(双线性映射)e: G1×G1 →G2,#G1=# G2 =p。  满足如下性质:  双线性(Bilinearity)  <aP, bQ> = <aP, Q>b=<P, bQ>a=<P, Q>ab  非退化(Non-degenerate)  对于任意P和Q,不全都映射到的单位元上  运算效率满足应用需求。  2007-7-24 Identity Based Encryption 5
  • 6. Pairing的进展 新的Pairing类型  Weil Pairing  Tate Pairing  Ate Pairing  新的适用于Pairing的椭圆曲线  超奇异椭圆曲线  MNT椭圆曲线  2007-7-24 Identity Based Encryption 6
  • 7. Pairing 密码基础 Pairing和离散对数问题的相似性  <aP, Q>b=<P, bQ>a =<P, Q>ab  (ga)b = (gb)a = gab  由Pairing构造的Diffie-Hellman密钥交换  P,Q为G1上的公开点,A (a, aP),B (b, bP)  A发送aP给B  B发送bP给A  A计算共享密钥<bP, Q>a =(<P, Q>b) a =<P, Q>ab  B计算共享密钥<aP, Q>b =(<P, Q>a) b =<P, Q>ab  2007-7-24 Identity Based Encryption 7
  • 8. Boneh-Franklin IBE 系统主密钥:整数s  公开的参数:椭圆曲线点sP,  接收方私钥:椭圆曲线点sQID  接收方公钥:QID=Map-to-point(ID)  加密:选择一个随机数 r∈Zq* ,明文 M 对  应的密文C={U,V}={rP, M⨁ 〈QID, sP〉r} 解密:M=V⨁〈sQID, rP〉  2007-7-24 Identity Based Encryption 8
  • 9. 密钥长度对比 Bits of Pairing ECC (CPK) RSA Security (BF-IBE) 80 160 512 1024 112 224 1024 2048 128 256 1536 3072 192 384 3840 7680 256 512 7680 15360 2007-7-24 Identity Based Encryption 9
  • 10. 效率对比 BF-IBE @ 512bit ECC, 512bit ECC : 160bit ECC = 9:1 2007-7-24 Identity Based Encryption 10
  • 11. 实现 Stanford PBC  Voltage IBE  Shamus MIRCAL  2007-7-24 Identity Based Encryption 11