SlideShare a Scribd company logo
1 of 11
Download to read offline
IBE发展现状
   关志
   Guanzhi@infosec.pku.edu.cn
   2007年7月24日




2007-7-24           Identity Based Encryption   1
四个基本的IBE体制

    Boneh-Franklin IBE                        2001





    Cocks IBE                                 2001





    Boneh-Boyen IBE                           2004





    Heng-Kurosawa IBE                         2004




2007-7-24         Identity Based Encryption          2
IBE的扩展

    层次IBE





    支持通配符的IBE





    模糊IBE





    …




2007-7-24   Identity Based Encryption   3
IBE体制

    IBE体制由四个部分构成



            系统建立:生成公开系统参数和主密钥
     



            私钥生成:由用户标识和主密钥导出用户私钥
     



            加密:由用户标识加密
     



            解密:由用户私钥解密
     




2007-7-24         Identity Based Encryption   4
Pairing基本概念

    Pairing(双线性映射)e: G1×G1 →G2,#G1=# G2 =p。



    满足如下性质:



            双线性(Bilinearity)
     


                <aP, bQ> = <aP, Q>b=<P, bQ>a=<P, Q>ab
            


            非退化(Non-degenerate)
     


                对于任意P和Q,不全都映射到的单位元上
            


            运算效率满足应用需求。
     



2007-7-24                     Identity Based Encryption   5
Pairing的进展

    新的Pairing类型



            Weil Pairing
     


            Tate Pairing
     


            Ate Pairing
     



    新的适用于Pairing的椭圆曲线



            超奇异椭圆曲线
     


            MNT椭圆曲线
     




2007-7-24                   Identity Based Encryption   6
Pairing 密码基础
    Pairing和离散对数问题的相似性


            <aP, Q>b=<P, bQ>a =<P, Q>ab
     

             (ga)b = (gb)a = gab
     




    由Pairing构造的Diffie-Hellman密钥交换


            P,Q为G1上的公开点,A (a, aP),B (b, bP)
     

            A发送aP给B
     

            B发送bP给A
     

            A计算共享密钥<bP, Q>a =(<P, Q>b) a =<P, Q>ab
     

            B计算共享密钥<aP, Q>b =(<P, Q>a) b =<P, Q>ab
     



2007-7-24                      Identity Based Encryption   7
Boneh-Franklin IBE
    系统主密钥:整数s


    公开的参数:椭圆曲线点sP,


    接收方私钥:椭圆曲线点sQID


    接收方公钥:QID=Map-to-point(ID)


    加密:选择一个随机数 r∈Zq* ,明文 M 对


    应的密文C={U,V}={rP, M⨁ 〈QID, sP〉r}
    解密:M=V⨁〈sQID, rP〉





2007-7-24        Identity Based Encryption   8
密钥长度对比

            Bits of                       Pairing
                       ECC (CPK)                        RSA
            Security                     (BF-IBE)
              80         160                 512        1024
              112        224                1024        2048
              128        256                1536        3072
              192        384                3840        7680
              256        512                7680        15360


2007-7-24                   Identity Based Encryption           9
效率对比




            BF-IBE @ 512bit ECC,
            512bit ECC : 160bit ECC = 9:1
2007-7-24            Identity Based Encryption   10
实现

    Stanford PBC





    Voltage IBE





    Shamus MIRCAL





2007-7-24          Identity Based Encryption   11

More Related Content

What's hot

دندان پزشکی در سعادت اباد
دندان پزشکی در سعادت اباددندان پزشکی در سعادت اباد
دندان پزشکی در سعادت ابادmohammaddoge
 
IPV9人类共同的理想/IPv9 - The common ideal for human being
IPV9人类共同的理想/IPv9 - The common ideal for human beingIPV9人类共同的理想/IPv9 - The common ideal for human being
IPV9人类共同的理想/IPv9 - The common ideal for human beingshizhao
 
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプトdevsumi2009
 
كيف تكسب مهارة التركيز
كيف تكسب مهارة التركيزكيف تكسب مهارة التركيز
كيف تكسب مهارة التركيزAhmed Zeen EL Abeden
 
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M JaletaU casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M JaletaCIMMYT
 
JARIR BOOKSTORE Lowprice
JARIR BOOKSTORE LowpriceJARIR BOOKSTORE Lowprice
JARIR BOOKSTORE Lowpricegueste54184
 
Marketing kotler1
Marketing kotler1Marketing kotler1
Marketing kotler1fanoos2000
 
Ar To Eng General Sample
Ar To Eng General SampleAr To Eng General Sample
Ar To Eng General Sampleguest719aad
 

What's hot (17)

دندان پزشکی در سعادت اباد
دندان پزشکی در سعادت اباددندان پزشکی در سعادت اباد
دندان پزشکی در سعادت اباد
 
It Flyer Page08
It Flyer Page08It Flyer Page08
It Flyer Page08
 
IPV9人类共同的理想/IPv9 - The common ideal for human being
IPV9人类共同的理想/IPv9 - The common ideal for human beingIPV9人类共同的理想/IPv9 - The common ideal for human being
IPV9人类共同的理想/IPv9 - The common ideal for human being
 
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
 
Book ridrog kotokatha (1st volume)
Book ridrog kotokatha (1st volume)Book ridrog kotokatha (1st volume)
Book ridrog kotokatha (1st volume)
 
كيف تكسب مهارة التركيز
كيف تكسب مهارة التركيزكيف تكسب مهارة التركيز
كيف تكسب مهارة التركيز
 
Lec 4 07
Lec 4 07Lec 4 07
Lec 4 07
 
Chocolate
ChocolateChocolate
Chocolate
 
Lec 1 07
Lec 1 07Lec 1 07
Lec 1 07
 
Lec 5 07
Lec 5 07Lec 5 07
Lec 5 07
 
Lec 2 07
Lec 2 07Lec 2 07
Lec 2 07
 
Lec 3 07
Lec 3 07Lec 3 07
Lec 3 07
 
از ایده تا اجرا
از ایده تا اجرااز ایده تا اجرا
از ایده تا اجرا
 
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M JaletaU casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
 
JARIR BOOKSTORE Lowprice
JARIR BOOKSTORE LowpriceJARIR BOOKSTORE Lowprice
JARIR BOOKSTORE Lowprice
 
Marketing kotler1
Marketing kotler1Marketing kotler1
Marketing kotler1
 
Ar To Eng General Sample
Ar To Eng General SampleAr To Eng General Sample
Ar To Eng General Sample
 

Viewers also liked

An Overview of Identity Based Encryption
An Overview of Identity Based EncryptionAn Overview of Identity Based Encryption
An Overview of Identity Based EncryptionVertoda System
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based EncryptionPratik Poddar
 
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTINGNexgen Technology
 
Vertoda wind farmoperations
Vertoda wind farmoperationsVertoda wind farmoperations
Vertoda wind farmoperationsVertoda System
 
CPK Theory And Parctice
CPK Theory And ParcticeCPK Theory And Parctice
CPK Theory And ParcticeZhi Guan
 
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsIdentity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsShakas Technologies
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingPvrtechnologies Nellore
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingCloudTechnologies
 

Viewers also liked (8)

An Overview of Identity Based Encryption
An Overview of Identity Based EncryptionAn Overview of Identity Based Encryption
An Overview of Identity Based Encryption
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
 
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 
Vertoda wind farmoperations
Vertoda wind farmoperationsVertoda wind farmoperations
Vertoda wind farmoperations
 
CPK Theory And Parctice
CPK Theory And ParcticeCPK Theory And Parctice
CPK Theory And Parctice
 
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsIdentity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applications
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 

Similar to A Survey of Identity-Based Encryption

다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...Amazon Web Services Korea
 
Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证Chui-Wen Chiu
 
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...taeseon ryu
 
095722121-期中報告-UGC
095722121-期中報告-UGC095722121-期中報告-UGC
095722121-期中報告-UGCcherish0906
 
Metadaily80131
Metadaily80131Metadaily80131
Metadaily80131arefnet
 
Lecture of Design of PKUPI
Lecture of Design of PKUPILecture of Design of PKUPI
Lecture of Design of PKUPIrealfish Qian
 
Heap overflow
Heap overflowHeap overflow
Heap overflow@x0mg
 
CRE-016-商業智慧
CRE-016-商業智慧CRE-016-商業智慧
CRE-016-商業智慧handbook
 
Revisiting the Sibling Head in Object Detector
Revisiting the Sibling Head in Object DetectorRevisiting the Sibling Head in Object Detector
Revisiting the Sibling Head in Object DetectorSungchul Kim
 
Web-based IPTV Service (Beyond IPTV)
Web-based IPTV Service (Beyond IPTV)Web-based IPTV Service (Beyond IPTV)
Web-based IPTV Service (Beyond IPTV)Seungyun Lee
 
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟taiwanweb20
 
Richard Databoard
Richard DataboardRichard Databoard
Richard Databoard巍 陆
 

Similar to A Survey of Identity-Based Encryption (13)

다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
 
Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证
 
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
 
095722121-期中報告-UGC
095722121-期中報告-UGC095722121-期中報告-UGC
095722121-期中報告-UGC
 
產品簡介
產品簡介產品簡介
產品簡介
 
Metadaily80131
Metadaily80131Metadaily80131
Metadaily80131
 
Lecture of Design of PKUPI
Lecture of Design of PKUPILecture of Design of PKUPI
Lecture of Design of PKUPI
 
Heap overflow
Heap overflowHeap overflow
Heap overflow
 
CRE-016-商業智慧
CRE-016-商業智慧CRE-016-商業智慧
CRE-016-商業智慧
 
Revisiting the Sibling Head in Object Detector
Revisiting the Sibling Head in Object DetectorRevisiting the Sibling Head in Object Detector
Revisiting the Sibling Head in Object Detector
 
Web-based IPTV Service (Beyond IPTV)
Web-based IPTV Service (Beyond IPTV)Web-based IPTV Service (Beyond IPTV)
Web-based IPTV Service (Beyond IPTV)
 
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
 
Richard Databoard
Richard DataboardRichard Databoard
Richard Databoard
 

More from Zhi Guan

USB Token Design and Implementation
USB Token Design and ImplementationUSB Token Design and Implementation
USB Token Design and ImplementationZhi Guan
 
CPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisCPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisZhi Guan
 
Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical PasswordsZhi Guan
 
CPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump SessionCPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump SessionZhi Guan
 
Ph D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityPh D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityZhi Guan
 
Red Office Documents Security Proposal
Red Office Documents Security ProposalRed Office Documents Security Proposal
Red Office Documents Security ProposalZhi Guan
 
ICDCS‘08 WebIBC
ICDCS‘08 WebIBCICDCS‘08 WebIBC
ICDCS‘08 WebIBCZhi Guan
 
Crypto With OpenSSL
Crypto With OpenSSLCrypto With OpenSSL
Crypto With OpenSSLZhi Guan
 
Code Signing with CPK
Code Signing with CPKCode Signing with CPK
Code Signing with CPKZhi Guan
 

More from Zhi Guan (10)

USB Token Design and Implementation
USB Token Design and ImplementationUSB Token Design and Implementation
USB Token Design and Implementation
 
CPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisCPK Cryptosystem In Solaris
CPK Cryptosystem In Solaris
 
Easy CPK
Easy CPKEasy CPK
Easy CPK
 
Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical Passwords
 
CPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump SessionCPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump Session
 
Ph D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityPh D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing Security
 
Red Office Documents Security Proposal
Red Office Documents Security ProposalRed Office Documents Security Proposal
Red Office Documents Security Proposal
 
ICDCS‘08 WebIBC
ICDCS‘08 WebIBCICDCS‘08 WebIBC
ICDCS‘08 WebIBC
 
Crypto With OpenSSL
Crypto With OpenSSLCrypto With OpenSSL
Crypto With OpenSSL
 
Code Signing with CPK
Code Signing with CPKCode Signing with CPK
Code Signing with CPK
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

A Survey of Identity-Based Encryption

  • 1. IBE发展现状 关志 Guanzhi@infosec.pku.edu.cn 2007年7月24日 2007-7-24 Identity Based Encryption 1
  • 2. 四个基本的IBE体制 Boneh-Franklin IBE 2001  Cocks IBE 2001  Boneh-Boyen IBE 2004  Heng-Kurosawa IBE 2004  2007-7-24 Identity Based Encryption 2
  • 3. IBE的扩展 层次IBE  支持通配符的IBE  模糊IBE  …  2007-7-24 Identity Based Encryption 3
  • 4. IBE体制 IBE体制由四个部分构成  系统建立:生成公开系统参数和主密钥  私钥生成:由用户标识和主密钥导出用户私钥  加密:由用户标识加密  解密:由用户私钥解密  2007-7-24 Identity Based Encryption 4
  • 5. Pairing基本概念 Pairing(双线性映射)e: G1×G1 →G2,#G1=# G2 =p。  满足如下性质:  双线性(Bilinearity)  <aP, bQ> = <aP, Q>b=<P, bQ>a=<P, Q>ab  非退化(Non-degenerate)  对于任意P和Q,不全都映射到的单位元上  运算效率满足应用需求。  2007-7-24 Identity Based Encryption 5
  • 6. Pairing的进展 新的Pairing类型  Weil Pairing  Tate Pairing  Ate Pairing  新的适用于Pairing的椭圆曲线  超奇异椭圆曲线  MNT椭圆曲线  2007-7-24 Identity Based Encryption 6
  • 7. Pairing 密码基础 Pairing和离散对数问题的相似性  <aP, Q>b=<P, bQ>a =<P, Q>ab  (ga)b = (gb)a = gab  由Pairing构造的Diffie-Hellman密钥交换  P,Q为G1上的公开点,A (a, aP),B (b, bP)  A发送aP给B  B发送bP给A  A计算共享密钥<bP, Q>a =(<P, Q>b) a =<P, Q>ab  B计算共享密钥<aP, Q>b =(<P, Q>a) b =<P, Q>ab  2007-7-24 Identity Based Encryption 7
  • 8. Boneh-Franklin IBE 系统主密钥:整数s  公开的参数:椭圆曲线点sP,  接收方私钥:椭圆曲线点sQID  接收方公钥:QID=Map-to-point(ID)  加密:选择一个随机数 r∈Zq* ,明文 M 对  应的密文C={U,V}={rP, M⨁ 〈QID, sP〉r} 解密:M=V⨁〈sQID, rP〉  2007-7-24 Identity Based Encryption 8
  • 9. 密钥长度对比 Bits of Pairing ECC (CPK) RSA Security (BF-IBE) 80 160 512 1024 112 224 1024 2048 128 256 1536 3072 192 384 3840 7680 256 512 7680 15360 2007-7-24 Identity Based Encryption 9
  • 10. 效率对比 BF-IBE @ 512bit ECC, 512bit ECC : 160bit ECC = 9:1 2007-7-24 Identity Based Encryption 10
  • 11. 实现 Stanford PBC  Voltage IBE  Shamus MIRCAL  2007-7-24 Identity Based Encryption 11