Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
Identity-Based Cryptosystems and Quadratic Residuosity
Marc Joye Proxy: Fabrice Benhamouda PKC 2016 · Tapei, Taiwan
1 / 20
Identity-Based Cryptosystems and Quadratic Residuosity Marc Joye - - PowerPoint PPT Presentation
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion Identity-Based Cryptosystems and Quadratic Residuosity Marc Joye Proxy: Fabrice Benhamouda PKC 2016 Tapei, Taiwan 1 / 20 Identity-Based Encryption
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
1 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
1 Setup
2 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
1 Setup
2 Encryption
2 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
1 Setup
2 Encryption
3 Key derivation
2 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
1 Setup
2 Encryption
3 Key derivation
4 Decryption
2 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
3 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
1
2
3
4
4 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
5 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
5 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
5 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
5 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
N |
N
N |
p
q
6 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
7 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
7 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
C=(c )
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
C=(c,¯ c)
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
1
2
3
4
8 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
p
9 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
p
9 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
p
p
9 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
10 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
10 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
10 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
10 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
∆y x−1
t2−∆, 2t t2−∆
11 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
12 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
p
12 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
p
N
12 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
¯ t2+uH(id) 2¯ t
2 ·
¯ t
c 2
13 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
1
2
3
4
14 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
t with
N
t′ , we have
N
15 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
3
16 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
16 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
N
17 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
2 with
2 satisfying
N
2 in
2
17 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
1
2
3
4
18 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
19 / 20
Identity-Based Encryption Cocks IBE Scheme Algebraic Structure Applications Conclusion
20 / 20