The k-BDH Assumption Family: Bilinear

The k-BDH Assumption
Family: Bilinear
Cryptography from
Progressively Weaker
Assumptions
Karyn Benson (UCSD)
Hovav Shacham (UCSD)
Brent Waters (UT-Austin)
Provable Security
How to show your cryptosystem is secure:
Cryptosystem
If Assumption Holds then
Cryptosystem Secure
Assumption
Prove contrapositive
What if the Assumption is False?
Cryptosystem
Assumption

Cannot reason about security

Adversary can use the attack on assumption to break
cryptosystem
How to Pick a Good Assumption?

Increase the size of parameters

e.g., RSA assumes factoring a large
number into 2 primes is hard

Factor: 77, 3869, 702619, …

Use a family of assumptions

As you increase a parameter k you
become more confident in the security
of the assumption

Example: k-Linear [HK07, Sha07]
Family of Strictly Weaker Assumptions
𝐴1

𝐴2
<
≠
…
<
≠
𝐴𝑘
<
≠
𝐴𝑘+1
…
An assumption 𝐴𝑘+1 is weaker than assumption 𝐴𝑘 , if


<
≠
If 𝐴𝑘 holds then so does 𝐴𝑘+1 (Breaking 𝐴𝑘+1 also breaks 𝐴𝑘 )
The assumption, 𝐴𝑘+1 , is strictly weaker than assumption, 𝐴𝑘 , if

𝐴𝑘+1 is weaker than 𝐴𝑘

And an oracle for 𝐴𝑘 does not help break 𝐴𝑘+1
DDH Assumption

Given < 𝑔, 𝑔𝑎, 𝑔𝑏, 𝑇 >

For some
𝑔, 𝑔𝑎, 𝑔𝑏, 𝑇
∈𝐺
It is hard to compute a discrete log
in a finite cyclic group 𝐺

Does 𝑇 ?= 𝑔𝑎𝑏

No polynomial time algorithm can achieve non-negligible
advantage deciding
Bilinear Maps


𝒆: 𝐺 × 𝐺 → 𝐺𝑇

Bilinear: 𝒆 𝑔𝑎 , 𝑔𝑏 = 𝒆(𝑔, 𝑔)𝑎𝑏 for all 𝑎, 𝑏 ∈ 𝑍𝑝

Non-Degenerate: If 𝑔 generates 𝐺, then 𝒆(𝑔, 𝑔) ≠ 1

Computable: 𝒆 is efficiently computable on all input
DDH does not hold for groups in which bilinear maps can be
computed


< 𝑔, 𝑔𝑎, 𝑔𝑏, 𝑇 ?= 𝑔𝑎𝑏 >
𝒆 𝑔𝑎 , 𝑔𝑏
?
=
𝒆(𝑔, 𝑇)
DBDH Assumption

How can we use DDH in bilinear groups?

Given < 𝑔, 𝑔𝑎, 𝑔𝑏, 𝑔𝑐 , 𝑇 >

For some 𝑔, 𝑔𝑎 , 𝑔𝑏 , 𝑔𝑐 ∈ 𝐺 and 𝑇 ∈ 𝐺𝑇
• Hard to compute discrete log: in 𝐺
and 𝐺𝑇
• Bilinear maps have 2 inputs
• Can’t undo a bilinear map

Does 𝑇 ?= 𝒆(𝑔, 𝑔)𝑎𝑏𝑐

No polynomial time algorithm can achieve non-negligible
advantage deciding
Decision Linear (DLIN) Assumption

How can we use DDH in settings where bilinear maps exist?

Given < 𝑔, 𝑔 𝑠1 , 𝑔 𝑠2 , 𝑔 𝑠1 𝑟1 , 𝑔 𝑠2 𝑟2 , 𝑇 >


𝑔, 𝑔 𝑠1 , 𝑔 𝑠2 , 𝑔 𝑠1𝑟1 , 𝑔 𝑠2𝑟2 , 𝑇 ∈ 𝐺
Does 𝑇 ?= 𝑔𝑟1 +𝑟2
This is like 2 DDH
problems:
𝑔, 𝑔 𝑠1 , 𝑔𝑟1 , 𝑔 𝑠1 𝑟1
• It is hard to compute discrete logs
• Bilinear maps only pair 2 elements
(not 3: 𝑔 𝑠1 , 𝑔 𝑠2 , 𝑔𝑟1 +𝑟2 )

No polynomial time algorithm can achieve non-negligible
advantage deciding, even in generic bilinear groups [BBS04]

Only a decisional problem – computationally same as DDH
k-Linear Family of Assumptions
 k-Linear
generalizes the Linear Assumption
 1-Linear
is DDH
 2-Linear
is Linear Assumption
 For
This is like k DDH
problems
𝑘 ≥ 1 Given < 𝑔, 𝑔 𝑠1 , … , 𝑔 𝑠𝑘 , 𝑔 𝑠1 𝑟1 , … , 𝑔 𝑠𝑘𝑟𝑘 , 𝑇 >
 𝑔, 𝑔 𝑠1 , … , 𝑔 𝑠𝑘 , 𝑔 𝑠1 𝑟1 , … , 𝑔 𝑠𝑘 𝑟𝑘 , 𝑇
 Does
∈𝐺
𝑇 ?= 𝑔𝑟1 +⋯+𝑟𝑘
 No
polynomial time algorithm can achieve non-negligible
advantage deciding
 Only
a decisional problem – computationally same as DDH
How are DLIN and DBDH Related?

If DLIN holds, then so does DBDH
< 𝑔, 𝑔 𝑠1 , 𝑔 𝑠2 , 𝑔 𝑠1𝑟1 , 𝑔 𝑠2 𝑟2 , 𝑇 ?= 𝑔𝑟1+𝑟2 >
DLIN Instance
< 𝑔, 𝑔 𝑠1 , 𝑔 𝑠2 , 𝑇 ?= 𝑔𝑟1+𝑟2 , 𝒆 𝑔 𝑠1 𝑟1 , 𝑔 𝑠2 ∙ 𝒆 𝑔 𝑠2 𝑟2 , 𝑔 𝑠1 > =
< 𝑔, 𝑔 𝑠1 , 𝑔 𝑠2 , 𝑇 ?= 𝑔𝑟1+𝑟2 , 𝒆(𝑔, 𝑔)(𝑠1 𝑠2)(𝑟1+𝑟2 ) >
DBDH Decider
[BW06]
Can extend DBDH to a Family of Assumptions?

DDH
DLIN
k-Linear
DBDH
????
Why?

For 𝑘 > 2 unclear how k-Linear
and DBDH are related

k-Linear only operates in the
source group

Example: Boneh-Boyen IBE – the
message is hidden in target
group
This is should be like
k DBDH problems
Failed Attempt

Given 𝑔, 𝑔𝑎, 𝑔𝑏, 𝑔 𝑠1 , … , 𝑔 𝑠𝑘 , 𝑔 𝑠1 𝑟1 , … , 𝑔 𝑠𝑘𝑟𝑘 𝜖 and 𝑇 𝜖 𝐺𝑇

Does 𝑇 ?=

Embeds k DBDH instances: (𝑔, 𝑔𝑎 , 𝑔𝑏 , 𝑔 𝑠𝑖 𝑟𝑖 , 𝒆 𝑔, 𝑔

… But is equivalent to DBDH:
𝑔, 𝑔𝑎 , 𝑔𝑏 , 𝑖 𝑔 𝑠𝑖 𝑟𝑖 = 𝑔(𝑠1𝑟1 +⋯+𝑠𝑘𝑟𝑘) , 𝑇 ?=
𝑠𝑖
𝒆
𝑔,
𝑔
𝑖
𝑎𝑏𝑟𝑖
=
𝑖 𝒆 𝑔, 𝑔
𝑎𝑏𝑠𝑖 𝑟𝑖
= 𝒆 𝑔, 𝑔
𝑖 𝒆 𝑔, 𝑔
𝑎𝑏(𝑠1 𝑟1 +⋯+𝑠𝑘 𝑟𝑘 )
𝑎𝑏(𝑠𝑖 𝑟𝑖 ) )
𝑎𝑏𝑠𝑖 𝑟𝑖
k-BDH Assumption

Given 𝑔, 𝑔𝑎, 𝑔𝑏, 𝑔 𝑠1 , … , 𝑔 𝑠𝑘 , 𝑔 𝑠1 𝑟1 , … , 𝑔 𝑠𝑘𝑟𝑘 𝜖 𝐺 and 𝑇 𝜖 𝐺𝑇
?
=
𝑖 𝒆 𝑔, 𝑔
𝑎𝑏𝑟𝑖
=
𝑠𝑖 , 𝑔 𝑠𝑖
𝒆
𝑔
𝑖
(𝑎 𝑠𝑖 )(𝑏 𝑠𝑖 )𝑟𝑖

Does 𝑇
= 𝒆 𝑔, 𝑔

Embeds k DBDH instances: (𝑔 𝑠𝑖 , 𝑔𝑎 , 𝑔𝑏 , 𝑔 𝑠𝑖 𝑟𝑖 ,𝒆 𝑔 𝑠𝑖 , 𝑔 𝑠𝑖

… And is a family of strictly weaker assumptions!
𝑎𝑏(𝑟1 +⋯+𝑟𝑘 )
(𝑎 𝑠𝑖 )(𝑏 𝑠𝑖 )𝑟𝑖
)
A Family of Weaker Assumptions

If the k-BDH assumption holds, so does the (k+1)-BDH assumption
𝑟
𝑟
𝑔, 𝑔𝑥, 𝑔𝑦, 𝑣1, … , 𝑣𝑘, 𝑣11 , … , 𝑣𝑘 𝑘 , 𝑇 ?=
𝒆 𝑔, 𝑔
𝑥𝑦𝑟𝑖
𝑣𝑘+1 , 𝑟𝑘+1
1≤𝑖≤𝑘
Random
Values
k-BDH Instance
𝑟
𝑟
𝑘+1
< 𝑔, 𝑔𝑥, 𝑔𝑦, 𝑣1, … , 𝑣𝑘+1 , 𝑣11 , … , 𝑣𝑘+1
,
𝑇 ∙ 𝒆(𝑔 𝑥 , 𝑔 𝑦 )𝑟𝑘+1
?
=
𝒆 𝑔, 𝑔
1≤𝑖≤𝑘+1
(k+1)-BDH Decider
𝑥𝑦𝑟𝑖 >
Evidence of a Family of Strictly Weaker Assumptions

An oracle for k-BDH does not help in deciding a (k+1)-BDH instance

Similar to the separation proof of k-Linear [Sha07]

Generic Group Model [BS84,Nechaev94,Shoup97]


Interact with adversary using an idealized version of groups

Bound the probability of finding an inconsistency if actual groups were used
Oracle to k-BDH is implemented as a modified k-multilinear map

maps k elements in 𝐺 and one element 𝐺𝑇 to an element group 𝐺𝑀
Application: IBE


Setup:
Public parameters: 𝑔, 𝑢 = 𝑔 𝑥 , 𝑣1 = 𝑔 𝑠1 , … , 𝑣𝑘 = 𝑔 𝑠𝑘 , 𝑣1 1 , … , 𝑣𝑘 𝑘 , 𝑤1 , … , 𝑤𝑘

Master key: 𝑠1 , … , 𝑠𝑘 , 𝑟1 , … , 𝑟𝑘 , 𝑥
KeyGen(ID):



Select random 𝑛1 , … , 𝑛𝑘 ∈ 𝑍𝑝∗
For each 1 ≤ 𝑖 ≤ 𝑘 output 𝐾𝐴,𝑖 , 𝐾𝐵,𝑖 = (𝑔
𝑥𝑟𝑖
𝑤 𝑢ID
𝑛𝑖
𝑖
𝑛
, 𝑣𝑖 𝑖 )
Encrypt (m, ID):

Select random 𝑦1 , … , 𝑦𝑘 ∈ 𝑍𝑝∗

Output 𝐶0 = 𝑚


𝑟
𝑟

1≤𝑖≤𝑘 𝒆
𝑔 𝑥 , 𝑣𝑖 𝑟𝑖
𝑦𝑖
For each 1 ≤ 𝑖 ≤ 𝑘 output 𝐶𝐴,𝑖 , 𝐶𝐵,𝑖 =
𝑦𝑖
(𝑣𝑖 ,
𝑤 𝑢ID
𝑖
𝑦𝑖
)
Decrypt(c):
𝐶0 ∙ 1≤𝑖≤𝑘 𝒆(𝐾𝐵,𝑖 ,𝐶𝐵,𝑖 )

1≤𝑖≤𝑘 𝒆(𝐾𝐴,𝑖 ,𝐶𝐴,𝑖 )
=
𝑚
𝑦𝑖
𝑛𝑖
𝒆
∙
𝒆(𝑣
, 𝑤𝑖 𝑢
1≤𝑖≤𝑘
1≤𝑖≤𝑘
𝑖
𝑛𝑖
𝑦𝑖
𝑥𝑟
𝑖 𝑤𝑖 𝑢
,𝑣𝑖 )
1≤𝑖≤𝑘 𝒆(𝑔
𝑔𝑥 ,𝑣𝑖 𝑟𝑖
ID
ID
𝑦𝑖
)
=𝑚
Conclusions

Goal: Introduction the k-BDH Family of Assumptions

Relationship to standard assumptions (DDH, k-Linear, DBDH)

It is a family of strictly weaker assumptions

Usable: We construct an IBE in the Boneh-Boyen Framework

Future Work


IBE construction grows with k (public parameters, keys, encryption)

Different applications
http://eprint.iacr.org/2012/687
Efficient Delegation of Key Generation and
Revocation Functionalities in
Identity-Based Encryption
Jae Hong Seo
Myongji University, Republic of Korea
Session ID: CRYP-F41
Session Classification: Intermediate
Identity Based Encryption
[email protected]
Publish mpk
1 time
download
ABC University
Issue DK
Enc(mpk,
Sender
, M)
User
Revocation Functionality in Identity-Based Encryption
[email protected]
Publish mpk
1 time
download
ABC University
If user1 leaves the system (by expiration of contract)
or user1’s secret key is leaked (by hacking) and so he
want to obtain other secret key?
KGC should revoke user1’s secret key!!
(and issues a new key if needed)
Sender
user1
Trivial Approach for Revocation Functionality in IBE
[email protected]
Publish mpk
1 time
download
ABC University
Issue DK
Enc(mpk,
Sender
,T
, T, M)
User
Trivial Approach for Revocation Functionality in IBE
[email protected]
Publish mpk
1 time
download
ABC University
Revoke DK
Issue DK
,T
,T
[email protected]
User
Sender
User2
Trivial Approach for Revocation Functionality in IBE
[email protected]
Publish mpk
1 time
download
ABC University
Revoke DK
Issue DK
,T
,T
[email protected]
KGC’s role: Issuing/Revoking secret keys
Excessive workload for a single KGC
User
Sender
User2
Our Goal:
Delegation of KGC’s Roles (Key Generation & Revocation)
Publish mpk
1 time
download
ABC University
ABC, Science
ABC, Science, Math
0
0
0
0
0
0
0
ABC, Science, Math, prof. Emura
0
0
0
1
0
1
0
ABC, Law
1
0
1
1
0
0
1
1
1
0
0
0
1
0
1
1
1
0
1
1
0
1
1
1
Our Goal:
Delegation of KGC’s Roles (Key Generation & Revocation)
Publish mpk
1 time
download
ABC University
Efficient Key Generation & Revocation
ABC, Science
0
0
ABC, Law
1
Efficient Key Generation & Revocation
ABC, Science, Math
0
0
Efficient Key Generation & Revocation0
0
0
ABC, Science, Math, prof. Emura
0
0
0
1
0
1
0
0
1
1
0
0
1
1
1
0
0
0
1
0
1
1
1
0
1
1
0
1
1
1
Outline
► Previous Approaches
► Revocable Symmetric Key Encryption: Broadcast Encryption
► Revocable Identity-Based Encryption
► Trivial Approach – Exponentially large secret key
► Our Approach – Asymmetric trade
► Further Study
Broadcast Encryption (BE) Technique
Each node has the corresponding key.
KEY0
KEY000
KEY011
0
0
0
KEY1
0
1
KEY111
1
1
0
1
1
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
u1
u2
u3
u4
u5
u6
u7
u8
We consider a binary tree kept by KGC
Broadcast Encryption (BE) Technique
u1
u2
u3
u4
u5
u6
u7
U3 has secret keys on the path to the root node
u8
Broadcast Encryption (BE) Technique
If u3, u4, and u6 are revoked, first compute triangles containing only non-revoked users.
u1
u2
u3
u4
u5
Revoked
u6
u7
u8
Broadcast Encryption (BE) Technique
Encrypt a session key using KEY00, KEY101, KEY11.
Then, only non-revoked user can recover the session key.
# of triangles ~ log N
(where N is # of leaf nodes)
1
1
0
0
1
0
0
u1
u2
u3
u4
u5
Revoked
u6
u7
u8
Revocable IBE:
Combining BE technique with IBE scheme
Publish mpk
ABC University
Issue SK
KGC
1 time
download
Size of KUT is logN.
KUT
Each time period
download
Enc(mpk,
Sender
, T, M)
user
Revocable IBE:
Combining BE technique with IBE scheme
Publish mpk
ABC University
Issue SK
KGC
1 time
download
Size of KUT is logN.
KUT
Each time period
download
Enc(mpk,
Sender
, T, M)
user
Revocable IBE:
Combining BE technique with IBE scheme
Key Revocation
1
1
0
0
u1
Key Generation
1
0
0
u2 u3
u4 u5
u6 u7
u8
u1
Revoked
u2 u3
u4 u5
u6 u7
u8
Whenever a user is registered in the system,
the user is assigned in the leaf node of binary tree.
Revocable IBE:
Combining BE technique with IBE scheme
1
1
0
0
u1
1
0
0
u2 u3
u4 u5
u6 u7
u8
u1
u2 u3
u4 u5
u6 u7
Secret Key related to the identity of u2
Key Update Information related to time ‘T’
u8
Revocable IBE:
Combining BE technique with IBE scheme
Since u2 has both related to the same node,
u2 can create a decryption key related to
both his ‘identity’ and ‘time’
1
1
0
0
u1
1
0
0
u2 u3
u4 u5
u6 u7
u8
u1
u2 u3
u4 u5
u6 u7
Secret Key related to the identity of u2
Key Update Information related to time ‘T’
u8
Revocable IBE:
Combining BE technique with IBE scheme
Publish mpk
ABC University
KGC
1 time
download
Sender
Size of KUT is logN.
KUT
Issue SK
Each time period
download
Enc(mpk, , T, M)
Only non-revoked users can generate a
decryption key dk ,T from KUT and SK
user
Trivial Approach for Our Goal
Hierarchical Structure ABC University
for Key Generation
ABC, Science
0
0
0
0
0
0
0
0
0
0
1
0
1
0
ABC, Science, Math, Prof. Emura
0
1
ABC, Law
1
1
0
0
1
1
1
0
0
0
1
0
1
1
1
0
1
1
1
1
1
Trivial Approach
Binary Tree for Revocation
(managed by KGC)ABC University
Science
ABC, Science
0
0
0
0
0
0
0
0
0
0
1
0
1
0
ABC, Science, Math, Prof. Emura
0
1
ABC, Law
1
1
0
0
1
1
1
0
0
0
1
0
1
u2 u3 u4 u5
1
1
0
1
1
1
1
1
u6u7
Law
Trivial Approach
Binary Tree for Revocation
Binary Tree for Revocation
(managed by KGC)
(managed by College)
Math
u2 u3 u4 u5
u6u7
ABC, Science
…
0
0
0
0
0
0
0
Science
0
0
0
1
0
1
0
ABC, Science, Math, Prof. Emura
0
1
ABC, Law
1
1
0
0
1
1
1
0
0
0
1
0
1
u2 u3 u4 u5
1
1
0
1
1
1
1
1
u6u7
Law
Trivial Approach
Binary Tree for Revocation
Binary Tree for Revocation
(managed by KGC)
(managed by College)
Science u2 u3 u4 u5
Binary Tree for Revocation
(managed by Department)
Math
u2 u3 u4 u5
u6u7
NICT, NSRI
…
u2 u3 u4 u5
Emura
0
0
0
0
0
0
0
0
0
0
1
0
1
0
ABC, Science, Math, Prof. Emura
u6u7
0
1
ABC, Law
1
…
1
0
0
1
1
1
0
0
0
1
0
1
1
1
0
1
1
1
1
1
u6u7
Law
Trivial Approach
Binary Tree for Revocation
(managed by KGC)
ABC University
Science
ABC, Science
0
0
0
0
0
0
0
0
0
0
1
0
1
0
ABC, Science, Math, prof. Emura
0
1
ABC
1
1
0
0
1
1
1
0
0
0
1
0
1
u2 u3 u4 u5
1
1
0
u6u7
Science needs to
store log N size
secret keys
1
1
1
1
1
Law
Trivial Approach
Key Update for time period ‘T’
(managed by KGC)
0
0
Science
Binary Tree for Revocation
(managed by KGC)
1
1
1
0
0
u2u3 u4 u5 u6u7
ABC University
u8
Science
ABC, Science
0
0
0
0
0
0
0
0
0
0
1
0
1
0
ABC, Science, Math, prof. Emura
0
1
ABC
1
1
0
0
1
1
1
0
0
0
1
0
1
u2 u3 u4 u5
1
1
0
u6u7
Science needs to
store log N size
secret keys
1
1
1
1
1
Law
Science is not revoked on time ‘T’.
(1) It can create a decryption key relate to its identity & time ‘T’.
(2) It can generate Key Update for its children.
Trivial Approach
Key Update for time period ‘T’
(managed by KGC)
0
0
Science
Binary Tree for Revocation
(managed by KGC)
1
1
1
0
0
u2u3 u4 u5 u6u7
ABC University
u8
Science
ABC, Science
0
0
0
0
0
0
0
0
0
1
0
1
0
ABC, Science, Math, prof. Emura
0
1
0
1
0
0
0
1
0
1
u6u7
Science needs to
ABC,WNRI
store log N size
secret keys
1
1
0
0
1
1
u2 u3 u4 u5
1
1
0
1
1
1
1
1
Law
Trivial Approach
Key Update for time period ‘T’
(managed by KGC)
0
0
Science
Binary Tree for Revocation
(managed by KGC)
1
1
1
0
0
ABC University
u2u3 u4 u5 u6u7
u8
Science
ABC, Science
0
0
Math
0
0
0
1
0
0
u2u3 u4 u5 u6u7
0
0
0
0
0
1
1
1
u8
u6u7
Science needs to
store log N size
Binary Tree for Revocation
(managed by Science)secret keys
0
Key Update for ‘T’
(managed by Science)
u2 u3 u4 u5
0
1
0
0
1
0
1
1
0
0
1
1
1
0Math
0
ABC
0
1 1
u2 01u3 10
1
1
u4 u5
1
1
1u6u7
…
Law
Trivial Approach
Key Update for time period ‘T’
(managed by KGC)
0
0
Science
Binary Tree for Revocation
(managed by KGC)
1
1
1
0
0
ABC University
u2u3 u4 u5 u6u7
u8
Science
ABC, Science
0
(managed by Science)
0
0
Math
0
0
0
1
0
0
u2u3 u4 u5 u6u7
0
0
1
1
1
u8
0
1
0
u6u7
Science needs to
store log N size
Binary Tree for Revocation
(managed by Science)secret keys
0
Does Science need
log N size secret
key?
0
0
Key Update for ‘T’
u2 u3 u4 u5
0
1
0
1
1
0
0
1
1
1
0Math
0
A
0
1 1
u2 01u3 10
1
1
u4 u5
1
1
1u6u7
…
Law
Trivial Approach
No!
Key Update for time period ‘T’
The parent (Science) has log N size
(managed
by KGC)
Binary Tree for Revocation
(managed by KGC)
secret key and one subkey is used for
each time period.
1
1
1
0
A child (Math) does
not
know
0
Science u u
u8
3 u
5 u6u
4 uused
7 each
subkey2 will
be
for
0
0
ABC University
which
time
Science
period.
Therefore, children should have
ABC, Science
(logN)2 subkeys.
0
(managed by Science)
0
0
Math
0
0
0
1
0
0
u2u3 u4 u5 u6u7
0
0
1
1
1
u8
0
1
0
u6u7
A,WNRIScience needs to
store log N size
Binary Tree for Revocation
(managed by Science)secret keys
…
Does SAL need log
N sizensecret key?
n-th
level
user
has
(logN)
size
secret
0
0
Key Update for ‘T’
0
keys
u2 u3 u4 u5
0
1
0
1
1
0
0
1
1
1
0Math
0
0
1 1
u2 01u3 10
1
1
u4 u5
1
1
1u6u7
…
Law
Trivial Approach
Our Approach – Asymmetric Trade
Product
Product
Our Approach – Asymmetric Trade
Technically difficult part:
Separated subkeys do not
leak any information.
To this end, we used several
re-randomization
Product
techniques.
Product
Our Result
► We propose the first practical RHIBE scheme
► Our scheme is based on Boneh-Boyen HIBE scheme
► The size of secret key is O(l2log N), where l is user’s level.
► We proved that the proposed scheme satisfies a weaker security
notion such as selective security notion.
Further Study
► Fully secure RHIBE
► Different revocation method, such as Subset Difference
► Revocation methodology in functional encryption
► Thanks!