SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
IBE发展现状
   关志
   Guanzhi@infosec.pku.edu.cn
   2007年7月24日




2007-7-24           Identity Based Encryption   1
四个基本的IBE体制

    Boneh-Franklin IBE                        2001





    Cocks IBE                                 2001





    Boneh-Boyen IBE                           2004





    Heng-Kurosawa IBE                         2004




2007-7-24         Identity Based Encryption          2
IBE的扩展

    层次IBE





    支持通配符的IBE





    模糊IBE





    …




2007-7-24   Identity Based Encryption   3
IBE体制

    IBE体制由四个部分构成



            系统建立:生成公开系统参数和主密钥
     



            私钥生成:由用户标识和主密钥导出用户私钥
     



            加密:由用户标识加密
     



            解密:由用户私钥解密
     




2007-7-24         Identity Based Encryption   4
Pairing基本概念

    Pairing(双线性映射)e: G1×G1 →G2,#G1=# G2 =p。



    满足如下性质:



            双线性(Bilinearity)
     


                <aP, bQ> = <aP, Q>b=<P, bQ>a=<P, Q>ab
            


            非退化(Non-degenerate)
     


                对于任意P和Q,不全都映射到的单位元上
            


            运算效率满足应用需求。
     



2007-7-24                     Identity Based Encryption   5
Pairing的进展

    新的Pairing类型



            Weil Pairing
     


            Tate Pairing
     


            Ate Pairing
     



    新的适用于Pairing的椭圆曲线



            超奇异椭圆曲线
     


            MNT椭圆曲线
     




2007-7-24                   Identity Based Encryption   6
Pairing 密码基础
    Pairing和离散对数问题的相似性


            <aP, Q>b=<P, bQ>a =<P, Q>ab
     

             (ga)b = (gb)a = gab
     




    由Pairing构造的Diffie-Hellman密钥交换


            P,Q为G1上的公开点,A (a, aP),B (b, bP)
     

            A发送aP给B
     

            B发送bP给A
     

            A计算共享密钥<bP, Q>a =(<P, Q>b) a =<P, Q>ab
     

            B计算共享密钥<aP, Q>b =(<P, Q>a) b =<P, Q>ab
     



2007-7-24                      Identity Based Encryption   7
Boneh-Franklin IBE
    系统主密钥:整数s


    公开的参数:椭圆曲线点sP,


    接收方私钥:椭圆曲线点sQID


    接收方公钥:QID=Map-to-point(ID)


    加密:选择一个随机数 r∈Zq* ,明文 M 对


    应的密文C={U,V}={rP, M⨁ 〈QID, sP〉r}
    解密:M=V⨁〈sQID, rP〉





2007-7-24        Identity Based Encryption   8
密钥长度对比

            Bits of                       Pairing
                       ECC (CPK)                        RSA
            Security                     (BF-IBE)
              80         160                 512        1024
              112        224                1024        2048
              128        256                1536        3072
              192        384                3840        7680
              256        512                7680        15360


2007-7-24                   Identity Based Encryption           9
效率对比




            BF-IBE @ 512bit ECC,
            512bit ECC : 160bit ECC = 9:1
2007-7-24            Identity Based Encryption   10
实现

    Stanford PBC





    Voltage IBE





    Shamus MIRCAL





2007-7-24          Identity Based Encryption   11

Más contenido relacionado

La actualidad más candente

دندان پزشکی در سعادت اباد
دندان پزشکی در سعادت اباددندان پزشکی در سعادت اباد
دندان پزشکی در سعادت ابادmohammaddoge
 
IPV9人类共同的理想/IPv9 - The common ideal for human being
IPV9人类共同的理想/IPv9 - The common ideal for human beingIPV9人类共同的理想/IPv9 - The common ideal for human being
IPV9人类共同的理想/IPv9 - The common ideal for human beingshizhao
 
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプトdevsumi2009
 
كيف تكسب مهارة التركيز
كيف تكسب مهارة التركيزكيف تكسب مهارة التركيز
كيف تكسب مهارة التركيزAhmed Zeen EL Abeden
 
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M JaletaU casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M JaletaCIMMYT
 
JARIR BOOKSTORE Lowprice
JARIR BOOKSTORE LowpriceJARIR BOOKSTORE Lowprice
JARIR BOOKSTORE Lowpricegueste54184
 
Marketing kotler1
Marketing kotler1Marketing kotler1
Marketing kotler1fanoos2000
 
Ar To Eng General Sample
Ar To Eng General SampleAr To Eng General Sample
Ar To Eng General Sampleguest719aad
 

La actualidad más candente (17)

دندان پزشکی در سعادت اباد
دندان پزشکی در سعادت اباددندان پزشکی در سعادت اباد
دندان پزشکی در سعادت اباد
 
It Flyer Page08
It Flyer Page08It Flyer Page08
It Flyer Page08
 
IPV9人类共同的理想/IPv9 - The common ideal for human being
IPV9人类共同的理想/IPv9 - The common ideal for human beingIPV9人类共同的理想/IPv9 - The common ideal for human being
IPV9人类共同的理想/IPv9 - The common ideal for human being
 
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
 
Book ridrog kotokatha (1st volume)
Book ridrog kotokatha (1st volume)Book ridrog kotokatha (1st volume)
Book ridrog kotokatha (1st volume)
 
كيف تكسب مهارة التركيز
كيف تكسب مهارة التركيزكيف تكسب مهارة التركيز
كيف تكسب مهارة التركيز
 
Lec 4 07
Lec 4 07Lec 4 07
Lec 4 07
 
Chocolate
ChocolateChocolate
Chocolate
 
Lec 1 07
Lec 1 07Lec 1 07
Lec 1 07
 
Lec 5 07
Lec 5 07Lec 5 07
Lec 5 07
 
Lec 2 07
Lec 2 07Lec 2 07
Lec 2 07
 
Lec 3 07
Lec 3 07Lec 3 07
Lec 3 07
 
از ایده تا اجرا
از ایده تا اجرااز ایده تا اجرا
از ایده تا اجرا
 
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M JaletaU casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
 
JARIR BOOKSTORE Lowprice
JARIR BOOKSTORE LowpriceJARIR BOOKSTORE Lowprice
JARIR BOOKSTORE Lowprice
 
Marketing kotler1
Marketing kotler1Marketing kotler1
Marketing kotler1
 
Ar To Eng General Sample
Ar To Eng General SampleAr To Eng General Sample
Ar To Eng General Sample
 

Destacado

An Overview of Identity Based Encryption
An Overview of Identity Based EncryptionAn Overview of Identity Based Encryption
An Overview of Identity Based EncryptionVertoda System
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based EncryptionPratik Poddar
 
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTINGNexgen Technology
 
Vertoda wind farmoperations
Vertoda wind farmoperationsVertoda wind farmoperations
Vertoda wind farmoperationsVertoda System
 
CPK Theory And Parctice
CPK Theory And ParcticeCPK Theory And Parctice
CPK Theory And ParcticeZhi Guan
 
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsIdentity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsShakas Technologies
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingPvrtechnologies Nellore
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingCloudTechnologies
 

Destacado (8)

An Overview of Identity Based Encryption
An Overview of Identity Based EncryptionAn Overview of Identity Based Encryption
An Overview of Identity Based Encryption
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
 
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 
Vertoda wind farmoperations
Vertoda wind farmoperationsVertoda wind farmoperations
Vertoda wind farmoperations
 
CPK Theory And Parctice
CPK Theory And ParcticeCPK Theory And Parctice
CPK Theory And Parctice
 
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsIdentity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applications
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 

Similar a A Survey of Identity-Based Encryption

다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...Amazon Web Services Korea
 
Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证Chui-Wen Chiu
 
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...taeseon ryu
 
095722121-期中報告-UGC
095722121-期中報告-UGC095722121-期中報告-UGC
095722121-期中報告-UGCcherish0906
 
Metadaily80131
Metadaily80131Metadaily80131
Metadaily80131arefnet
 
Lecture of Design of PKUPI
Lecture of Design of PKUPILecture of Design of PKUPI
Lecture of Design of PKUPIrealfish Qian
 
Heap overflow
Heap overflowHeap overflow
Heap overflow@x0mg
 
CRE-016-商業智慧
CRE-016-商業智慧CRE-016-商業智慧
CRE-016-商業智慧handbook
 
Revisiting the Sibling Head in Object Detector
Revisiting the Sibling Head in Object DetectorRevisiting the Sibling Head in Object Detector
Revisiting the Sibling Head in Object DetectorSungchul Kim
 
Web-based IPTV Service (Beyond IPTV)
Web-based IPTV Service (Beyond IPTV)Web-based IPTV Service (Beyond IPTV)
Web-based IPTV Service (Beyond IPTV)Seungyun Lee
 
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟taiwanweb20
 
Richard Databoard
Richard DataboardRichard Databoard
Richard Databoard巍 陆
 

Similar a A Survey of Identity-Based Encryption (13)

다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
 
Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证
 
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
 
095722121-期中報告-UGC
095722121-期中報告-UGC095722121-期中報告-UGC
095722121-期中報告-UGC
 
產品簡介
產品簡介產品簡介
產品簡介
 
Metadaily80131
Metadaily80131Metadaily80131
Metadaily80131
 
Lecture of Design of PKUPI
Lecture of Design of PKUPILecture of Design of PKUPI
Lecture of Design of PKUPI
 
Heap overflow
Heap overflowHeap overflow
Heap overflow
 
CRE-016-商業智慧
CRE-016-商業智慧CRE-016-商業智慧
CRE-016-商業智慧
 
Revisiting the Sibling Head in Object Detector
Revisiting the Sibling Head in Object DetectorRevisiting the Sibling Head in Object Detector
Revisiting the Sibling Head in Object Detector
 
Web-based IPTV Service (Beyond IPTV)
Web-based IPTV Service (Beyond IPTV)Web-based IPTV Service (Beyond IPTV)
Web-based IPTV Service (Beyond IPTV)
 
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
 
Richard Databoard
Richard DataboardRichard Databoard
Richard Databoard
 

Más de Zhi Guan

USB Token Design and Implementation
USB Token Design and ImplementationUSB Token Design and Implementation
USB Token Design and ImplementationZhi Guan
 
CPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisCPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisZhi Guan
 
Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical PasswordsZhi Guan
 
CPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump SessionCPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump SessionZhi Guan
 
Ph D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityPh D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityZhi Guan
 
Red Office Documents Security Proposal
Red Office Documents Security ProposalRed Office Documents Security Proposal
Red Office Documents Security ProposalZhi Guan
 
ICDCS‘08 WebIBC
ICDCS‘08 WebIBCICDCS‘08 WebIBC
ICDCS‘08 WebIBCZhi Guan
 
Crypto With OpenSSL
Crypto With OpenSSLCrypto With OpenSSL
Crypto With OpenSSLZhi Guan
 
Code Signing with CPK
Code Signing with CPKCode Signing with CPK
Code Signing with CPKZhi Guan
 

Más de Zhi Guan (10)

USB Token Design and Implementation
USB Token Design and ImplementationUSB Token Design and Implementation
USB Token Design and Implementation
 
CPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisCPK Cryptosystem In Solaris
CPK Cryptosystem In Solaris
 
Easy CPK
Easy CPKEasy CPK
Easy CPK
 
Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical Passwords
 
CPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump SessionCPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump Session
 
Ph D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityPh D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing Security
 
Red Office Documents Security Proposal
Red Office Documents Security ProposalRed Office Documents Security Proposal
Red Office Documents Security Proposal
 
ICDCS‘08 WebIBC
ICDCS‘08 WebIBCICDCS‘08 WebIBC
ICDCS‘08 WebIBC
 
Crypto With OpenSSL
Crypto With OpenSSLCrypto With OpenSSL
Crypto With OpenSSL
 
Code Signing with CPK
Code Signing with CPKCode Signing with CPK
Code Signing with CPK
 

Último

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 

Último (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 

A Survey of Identity-Based Encryption

  • 1. IBE发展现状 关志 Guanzhi@infosec.pku.edu.cn 2007年7月24日 2007-7-24 Identity Based Encryption 1
  • 2. 四个基本的IBE体制 Boneh-Franklin IBE 2001  Cocks IBE 2001  Boneh-Boyen IBE 2004  Heng-Kurosawa IBE 2004  2007-7-24 Identity Based Encryption 2
  • 3. IBE的扩展 层次IBE  支持通配符的IBE  模糊IBE  …  2007-7-24 Identity Based Encryption 3
  • 4. IBE体制 IBE体制由四个部分构成  系统建立:生成公开系统参数和主密钥  私钥生成:由用户标识和主密钥导出用户私钥  加密:由用户标识加密  解密:由用户私钥解密  2007-7-24 Identity Based Encryption 4
  • 5. Pairing基本概念 Pairing(双线性映射)e: G1×G1 →G2,#G1=# G2 =p。  满足如下性质:  双线性(Bilinearity)  <aP, bQ> = <aP, Q>b=<P, bQ>a=<P, Q>ab  非退化(Non-degenerate)  对于任意P和Q,不全都映射到的单位元上  运算效率满足应用需求。  2007-7-24 Identity Based Encryption 5
  • 6. Pairing的进展 新的Pairing类型  Weil Pairing  Tate Pairing  Ate Pairing  新的适用于Pairing的椭圆曲线  超奇异椭圆曲线  MNT椭圆曲线  2007-7-24 Identity Based Encryption 6
  • 7. Pairing 密码基础 Pairing和离散对数问题的相似性  <aP, Q>b=<P, bQ>a =<P, Q>ab  (ga)b = (gb)a = gab  由Pairing构造的Diffie-Hellman密钥交换  P,Q为G1上的公开点,A (a, aP),B (b, bP)  A发送aP给B  B发送bP给A  A计算共享密钥<bP, Q>a =(<P, Q>b) a =<P, Q>ab  B计算共享密钥<aP, Q>b =(<P, Q>a) b =<P, Q>ab  2007-7-24 Identity Based Encryption 7
  • 8. Boneh-Franklin IBE 系统主密钥:整数s  公开的参数:椭圆曲线点sP,  接收方私钥:椭圆曲线点sQID  接收方公钥:QID=Map-to-point(ID)  加密:选择一个随机数 r∈Zq* ,明文 M 对  应的密文C={U,V}={rP, M⨁ 〈QID, sP〉r} 解密:M=V⨁〈sQID, rP〉  2007-7-24 Identity Based Encryption 8
  • 9. 密钥长度对比 Bits of Pairing ECC (CPK) RSA Security (BF-IBE) 80 160 512 1024 112 224 1024 2048 128 256 1536 3072 192 384 3840 7680 256 512 7680 15360 2007-7-24 Identity Based Encryption 9
  • 10. 效率对比 BF-IBE @ 512bit ECC, 512bit ECC : 160bit ECC = 9:1 2007-7-24 Identity Based Encryption 10
  • 11. 实现 Stanford PBC  Voltage IBE  Shamus MIRCAL  2007-7-24 Identity Based Encryption 11