IBE2ABE
IBE2ABE
1 Complexity Assumptions
Let G and GT be prime p-order cyclic groups with a bilinear mapping
e : G × G → GT , g ∈ G, s, a, b, {bj }j∈[1,q] ∈ Z∗p , q ∈ N.
Decisional Diffie-Hellman (DDH) assumption. Given Y ~ = {g, g a , g b },
ab
D = e(g, g) , R ∈R GT , the advantage of distinguishing distributions (Y~ , D)
~ , R) is negligible for any PPT adversary A. That is,
and (Y
~ , D) = 1] − P r[A(Y
AdvA = |P r[A(Y ~ , R) = 1]| ≤ η,
where η is negligible.
Decisional Bilinear Diffie-Hellman Exponent (DBDHE) Assump-
~ = {g, g s , {g ai }i∈[1,2q],i6=q+1 }, D = e(g, g)aq+1 s , R ∈R GT , the
tion. Given Y
~ , D) and (Y
advantage of distinguishing distributions (Y ~ , R) is negligible for any
PPT adversary A.
• For any A ∈ A, there exists {ωi }i∈I such that i∈I ωi Mi = (1, 0, ..., 0),
P
The access policy A with the matrix (M, ρ) is denoted as A(M, ρ). Using
A(M, ρ), we can share and reconstruct secrets as follows.
• Sharing: Inputs the secret s and an access policy A(M, ρ), chooses y2 , y3 , ..., yn ,
sets ~v = (s, y2 , y3 , ..., yn ), computes and outputs the share set {λi : λi =
~v · Mi }i∈[1,n] .
1
0.3 Proof
The improved scheme is IND-CPA secure under the DBDHE assumption.
Assuming A can win the IND-CPA GAME with an advantage of ε, we
construct B to solve the DBDHE problem.
2
Chooses t0 ∈R Z∗p and computes
0 0 Y q−j+2 −1
k1 =[g α (g a )t (g a )θj ]b
j∈[2,n∗ ]
0 q+1 q+1 0 Y q−j+1 −1
=[g α g a (g a )−1 (g1 )t (g1a )θj ]b
j∈[2,n∗ ]
0 Y q−j+1 −1
=[g α (g a )t (g1a )θj ]b
j∈[1,n∗ ]
−1 −1
=gαb g1tb ,
0 Y q−j+1
k2 =g t (g a )θj = g t ,
j∈[1,n∗ ]
t0
j ∗ j ∗
θj aq−j+1
Y Y P
=[g γx (g a )mi,j ] [g γx (g a )mi,j ] j∈[1,n∗ ]
j∈[1,n∗ ] j∈[1,n∗ ]
P q−j+1
0 j∈[1,n∗ ] θj a
=htx hx
=htx .
3
– Chooses s̃, s2 , s3 , ..., sn∗ ∈R Z∗p , computes
0
C ∗ =Kβ T e(g s , g α ),
c∗ =g bs ,
0
c0∗ =g s g s̃ = g s+s̃ = g s ,
Y ∗
c∗i =h−s̃
ρ∗ (i) g
−sγρ∗ (i)
g ami,j sj
j∈[2,n∗]
a j∈[2,n∗ ] m∗ j ∗ j ∗
P P P
=h−s̃ −sγρ∗ (i) i,j sj j∈[1,n∗ ] sa mi,j − j∈[1,n∗ ] sa mi,j
ρ∗ (i) g g g g
j
m∗
Y
=h−s̃
ρ∗ (i) g
aλi γρ∗ (i)
[g (g a ) i,j ]−s
j∈[1,n∗ ]
∗
−1 T
where implicitly sets ~v = (s, s2 + sa, s3 + sa2 , ..., sn∗ + san ) ,
T ∗ 0
(λ1 , λ2 , ..., λl∗ ) = M · ~v , and s = s + s̃.
– Computes the commitment of message
s 0
,g α ))
com∗ = g H(Kβ ) hH(T e(g .
~ , D) = 1] = P r[β = β 0 |T = D] = 1 ± .
P r[B(Y
2
4
q+1
• When T = R 6= e(g, g)a s
, the challenge ciphertext KEC ∗ is a correct
ciphertext for random message K̃ = C ∗ · Y −s , independent of β. In this
case, A is unable to launch any meaningful attacks, and we have
~ , R) = 1] = P r[β = β 0 |T = R] = 1
P r[B(Y .
2
~ , R) = 1]| = 1 ± − 1 = .
~ , D) = 1] − P r[B(Y
AdvB = |P r[B(Y
2 2
7