SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
IBE发展现状
   关志
   Guanzhi@infosec.pku.edu.cn
   2007年7月24日




2007-7-24           Identity Based Encryption   1
四个基本的IBE体制

    Boneh-Franklin IBE                        2001





    Cocks IBE                                 2001





    Boneh-Boyen IBE                           2004





    Heng-Kurosawa IBE                         2004




2007-7-24         Identity Based Encryption          2
IBE的扩展

    层次IBE





    支持通配符的IBE





    模糊IBE





    …




2007-7-24   Identity Based Encryption   3
IBE体制

    IBE体制由四个部分构成



            系统建立:生成公开系统参数和主密钥
     



            私钥生成:由用户标识和主密钥导出用户私钥
     



            加密:由用户标识加密
     



            解密:由用户私钥解密
     




2007-7-24         Identity Based Encryption   4
Pairing基本概念

    Pairing(双线性映射)e: G1×G1 →G2,#G1=# G2 =p。



    满足如下性质:



            双线性(Bilinearity)
     


                <aP, bQ> = <aP, Q>b=<P, bQ>a=<P, Q>ab
            


            非退化(Non-degenerate)
     


                对于任意P和Q,不全都映射到的单位元上
            


            运算效率满足应用需求。
     



2007-7-24                     Identity Based Encryption   5
Pairing的进展

    新的Pairing类型



            Weil Pairing
     


            Tate Pairing
     


            Ate Pairing
     



    新的适用于Pairing的椭圆曲线



            超奇异椭圆曲线
     


            MNT椭圆曲线
     




2007-7-24                   Identity Based Encryption   6
Pairing 密码基础
    Pairing和离散对数问题的相似性


            <aP, Q>b=<P, bQ>a =<P, Q>ab
     

             (ga)b = (gb)a = gab
     




    由Pairing构造的Diffie-Hellman密钥交换


            P,Q为G1上的公开点,A (a, aP),B (b, bP)
     

            A发送aP给B
     

            B发送bP给A
     

            A计算共享密钥<bP, Q>a =(<P, Q>b) a =<P, Q>ab
     

            B计算共享密钥<aP, Q>b =(<P, Q>a) b =<P, Q>ab
     



2007-7-24                      Identity Based Encryption   7
Boneh-Franklin IBE
    系统主密钥:整数s


    公开的参数:椭圆曲线点sP,


    接收方私钥:椭圆曲线点sQID


    接收方公钥:QID=Map-to-point(ID)


    加密:选择一个随机数 r∈Zq* ,明文 M 对


    应的密文C={U,V}={rP, M⨁ 〈QID, sP〉r}
    解密:M=V⨁〈sQID, rP〉





2007-7-24        Identity Based Encryption   8
密钥长度对比

            Bits of                       Pairing
                       ECC (CPK)                        RSA
            Security                     (BF-IBE)
              80         160                 512        1024
              112        224                1024        2048
              128        256                1536        3072
              192        384                3840        7680
              256        512                7680        15360


2007-7-24                   Identity Based Encryption           9
效率对比




            BF-IBE @ 512bit ECC,
            512bit ECC : 160bit ECC = 9:1
2007-7-24            Identity Based Encryption   10
实现

    Stanford PBC





    Voltage IBE





    Shamus MIRCAL





2007-7-24          Identity Based Encryption   11

Más contenido relacionado

La actualidad más candente

【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
devsumi2009
 
كيف تكسب مهارة التركيز
كيف تكسب مهارة التركيزكيف تكسب مهارة التركيز
كيف تكسب مهارة التركيز
Ahmed Zeen EL Abeden
 
Ar To Eng General Sample
Ar To Eng General SampleAr To Eng General Sample
Ar To Eng General Sample
guest719aad
 

La actualidad más candente (17)

دندان پزشکی در سعادت اباد
دندان پزشکی در سعادت اباددندان پزشکی در سعادت اباد
دندان پزشکی در سعادت اباد
 
It Flyer Page08
It Flyer Page08It Flyer Page08
It Flyer Page08
 
IPV9人类共同的理想/IPv9 - The common ideal for human being
IPV9人类共同的理想/IPv9 - The common ideal for human beingIPV9人类共同的理想/IPv9 - The common ideal for human being
IPV9人类共同的理想/IPv9 - The common ideal for human being
 
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
【13-C-7】 Developers [Media] Summit InfoQ のコンセプト
 
Book ridrog kotokatha (1st volume)
Book ridrog kotokatha (1st volume)Book ridrog kotokatha (1st volume)
Book ridrog kotokatha (1st volume)
 
كيف تكسب مهارة التركيز
كيف تكسب مهارة التركيزكيف تكسب مهارة التركيز
كيف تكسب مهارة التركيز
 
Lec 4 07
Lec 4 07Lec 4 07
Lec 4 07
 
Chocolate
ChocolateChocolate
Chocolate
 
Lec 1 07
Lec 1 07Lec 1 07
Lec 1 07
 
Lec 5 07
Lec 5 07Lec 5 07
Lec 5 07
 
Lec 2 07
Lec 2 07Lec 2 07
Lec 2 07
 
Lec 3 07
Lec 3 07Lec 3 07
Lec 3 07
 
از ایده تا اجرا
از ایده تا اجرااز ایده تا اجرا
از ایده تا اجرا
 
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M JaletaU casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
U casfesa ýa롃 ¾}ñ– ¬ö„‹&}v¡a°‹& }óça„‹“ ø ›ò×u°‹ M Jaleta
 
JARIR BOOKSTORE Lowprice
JARIR BOOKSTORE LowpriceJARIR BOOKSTORE Lowprice
JARIR BOOKSTORE Lowprice
 
Marketing kotler1
Marketing kotler1Marketing kotler1
Marketing kotler1
 
Ar To Eng General Sample
Ar To Eng General SampleAr To Eng General Sample
Ar To Eng General Sample
 

Destacado

Vertoda wind farmoperations
Vertoda wind farmoperationsVertoda wind farmoperations
Vertoda wind farmoperations
Vertoda System
 
CPK Theory And Parctice
CPK Theory And ParcticeCPK Theory And Parctice
CPK Theory And Parctice
Zhi Guan
 

Destacado (8)

An Overview of Identity Based Encryption
An Overview of Identity Based EncryptionAn Overview of Identity Based Encryption
An Overview of Identity Based Encryption
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
 
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 
Vertoda wind farmoperations
Vertoda wind farmoperationsVertoda wind farmoperations
Vertoda wind farmoperations
 
CPK Theory And Parctice
CPK Theory And ParcticeCPK Theory And Parctice
CPK Theory And Parctice
 
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsIdentity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applications
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 

Similar a A Survey of Identity-Based Encryption

Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证
Chui-Wen Chiu
 
095722121-期中報告-UGC
095722121-期中報告-UGC095722121-期中報告-UGC
095722121-期中報告-UGC
cherish0906
 
Metadaily80131
Metadaily80131Metadaily80131
Metadaily80131
arefnet
 
CRE-016-商業智慧
CRE-016-商業智慧CRE-016-商業智慧
CRE-016-商業智慧
handbook
 
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
taiwanweb20
 
Richard Databoard
Richard DataboardRichard Databoard
Richard Databoard
巍 陆
 

Similar a A Survey of Identity-Based Encryption (13)

다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
다양한 업무에 적합한 AWS의 스토리지 서비스 알아보기 – 김상현, AWS 솔루션즈 아키텍트:: AWS Builders Online Ser...
 
Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证Windows 7兼容性系列课程(5):Windows 7徽标认证
Windows 7兼容性系列课程(5):Windows 7徽标认证
 
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
Bart : Denoising Sequence-to-Sequence Pre-training for Natural Language Gener...
 
095722121-期中報告-UGC
095722121-期中報告-UGC095722121-期中報告-UGC
095722121-期中報告-UGC
 
產品簡介
產品簡介產品簡介
產品簡介
 
Metadaily80131
Metadaily80131Metadaily80131
Metadaily80131
 
Lecture of Design of PKUPI
Lecture of Design of PKUPILecture of Design of PKUPI
Lecture of Design of PKUPI
 
Heap overflow
Heap overflowHeap overflow
Heap overflow
 
CRE-016-商業智慧
CRE-016-商業智慧CRE-016-商業智慧
CRE-016-商業智慧
 
Revisiting the Sibling Head in Object Detector
Revisiting the Sibling Head in Object DetectorRevisiting the Sibling Head in Object Detector
Revisiting the Sibling Head in Object Detector
 
Web-based IPTV Service (Beyond IPTV)
Web-based IPTV Service (Beyond IPTV)Web-based IPTV Service (Beyond IPTV)
Web-based IPTV Service (Beyond IPTV)
 
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
 
Richard Databoard
Richard DataboardRichard Databoard
Richard Databoard
 

Más de Zhi Guan

USB Token Design and Implementation
USB Token Design and ImplementationUSB Token Design and Implementation
USB Token Design and Implementation
Zhi Guan
 
CPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisCPK Cryptosystem In Solaris
CPK Cryptosystem In Solaris
Zhi Guan
 
Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical Passwords
Zhi Guan
 
CPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump SessionCPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump Session
Zhi Guan
 
Ph D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityPh D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing Security
Zhi Guan
 
Red Office Documents Security Proposal
Red Office Documents Security ProposalRed Office Documents Security Proposal
Red Office Documents Security Proposal
Zhi Guan
 
ICDCS‘08 WebIBC
ICDCS‘08 WebIBCICDCS‘08 WebIBC
ICDCS‘08 WebIBC
Zhi Guan
 
Crypto With OpenSSL
Crypto With OpenSSLCrypto With OpenSSL
Crypto With OpenSSL
Zhi Guan
 
Code Signing with CPK
Code Signing with CPKCode Signing with CPK
Code Signing with CPK
Zhi Guan
 

Más de Zhi Guan (10)

USB Token Design and Implementation
USB Token Design and ImplementationUSB Token Design and Implementation
USB Token Design and Implementation
 
CPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisCPK Cryptosystem In Solaris
CPK Cryptosystem In Solaris
 
Easy CPK
Easy CPKEasy CPK
Easy CPK
 
Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical Passwords
 
CPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump SessionCPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump Session
 
Ph D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityPh D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing Security
 
Red Office Documents Security Proposal
Red Office Documents Security ProposalRed Office Documents Security Proposal
Red Office Documents Security Proposal
 
ICDCS‘08 WebIBC
ICDCS‘08 WebIBCICDCS‘08 WebIBC
ICDCS‘08 WebIBC
 
Crypto With OpenSSL
Crypto With OpenSSLCrypto With OpenSSL
Crypto With OpenSSL
 
Code Signing with CPK
Code Signing with CPKCode Signing with CPK
Code Signing with CPK
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

A Survey of Identity-Based Encryption

  • 1. IBE发展现状 关志 Guanzhi@infosec.pku.edu.cn 2007年7月24日 2007-7-24 Identity Based Encryption 1
  • 2. 四个基本的IBE体制 Boneh-Franklin IBE 2001  Cocks IBE 2001  Boneh-Boyen IBE 2004  Heng-Kurosawa IBE 2004  2007-7-24 Identity Based Encryption 2
  • 3. IBE的扩展 层次IBE  支持通配符的IBE  模糊IBE  …  2007-7-24 Identity Based Encryption 3
  • 4. IBE体制 IBE体制由四个部分构成  系统建立:生成公开系统参数和主密钥  私钥生成:由用户标识和主密钥导出用户私钥  加密:由用户标识加密  解密:由用户私钥解密  2007-7-24 Identity Based Encryption 4
  • 5. Pairing基本概念 Pairing(双线性映射)e: G1×G1 →G2,#G1=# G2 =p。  满足如下性质:  双线性(Bilinearity)  <aP, bQ> = <aP, Q>b=<P, bQ>a=<P, Q>ab  非退化(Non-degenerate)  对于任意P和Q,不全都映射到的单位元上  运算效率满足应用需求。  2007-7-24 Identity Based Encryption 5
  • 6. Pairing的进展 新的Pairing类型  Weil Pairing  Tate Pairing  Ate Pairing  新的适用于Pairing的椭圆曲线  超奇异椭圆曲线  MNT椭圆曲线  2007-7-24 Identity Based Encryption 6
  • 7. Pairing 密码基础 Pairing和离散对数问题的相似性  <aP, Q>b=<P, bQ>a =<P, Q>ab  (ga)b = (gb)a = gab  由Pairing构造的Diffie-Hellman密钥交换  P,Q为G1上的公开点,A (a, aP),B (b, bP)  A发送aP给B  B发送bP给A  A计算共享密钥<bP, Q>a =(<P, Q>b) a =<P, Q>ab  B计算共享密钥<aP, Q>b =(<P, Q>a) b =<P, Q>ab  2007-7-24 Identity Based Encryption 7
  • 8. Boneh-Franklin IBE 系统主密钥:整数s  公开的参数:椭圆曲线点sP,  接收方私钥:椭圆曲线点sQID  接收方公钥:QID=Map-to-point(ID)  加密:选择一个随机数 r∈Zq* ,明文 M 对  应的密文C={U,V}={rP, M⨁ 〈QID, sP〉r} 解密:M=V⨁〈sQID, rP〉  2007-7-24 Identity Based Encryption 8
  • 9. 密钥长度对比 Bits of Pairing ECC (CPK) RSA Security (BF-IBE) 80 160 512 1024 112 224 1024 2048 128 256 1536 3072 192 384 3840 7680 256 512 7680 15360 2007-7-24 Identity Based Encryption 9
  • 10. 效率对比 BF-IBE @ 512bit ECC, 512bit ECC : 160bit ECC = 9:1 2007-7-24 Identity Based Encryption 10
  • 11. 实现 Stanford PBC  Voltage IBE  Shamus MIRCAL  2007-7-24 Identity Based Encryption 11