论文部分内容阅读
In 2007, Goyal introduced a new and creative approach, called accountable authority identity-based encryption (referred to as A-IBE), to reduce the degree of trust that must be placed in the private-key generator (PKG) in an identity-based encryption (IBE) scheme. Based on his work, a new universal A-IBE scheme is proposed in this paper. Compared with Goyal’s universal scheme, this new universal A-IBE scheme not only optimizes the time requirements for pairing operations, but also achieves a “tighter” security reduction based on a weaker hard problem (the discrete logarithm problem) under a stronger security definition (using an adaptively selected identity). Because there are many fewer pairing operations in this new scheme, the performance of the application can be improved to some degree. In addition, because of the “tighter” security reduction achieved by this new proposed scheme, a less restrictive security parameter can be chosen while achieving the same security as with Goyal’s scheme along with an improvement in performance. In the respect of the time requirement, compared with the Goyal’s universal scheme, this new scheme could be more efficient. Regrettably, these improvements will increase the memory needed for the public parameters and the volume of communications required. Compromise values of the public parameters should therefore be chosen to balance the advantages and drawbacks.
In 2007, Goyal introduced a new and creative approach, called accountable authority identity-based encryption (referred to as A-IBE), to reduce the degree of trust that must be placed in the private-key generator (PKG) in an identity- Based on his work, a new universal A-IBE scheme is proposed in this paper. Compared with Goyal’s universal scheme, this new universal A-IBE scheme not only optimizes the time requirements for pairing operations, but also achieves a “tighter” security reduction based on a weaker hard problem (the discrete logarithm problem) under a stronger security definition (using an adaptively selected identity). Because there are many fewer pairing operations in this new scheme, the performance of the In addition, because of the “tighter” security reduction achieved by this new proposed scheme, a less restrictive security parameter can be chosen while achieving the same security as with Goya l’s scheme along with an improvement in performance. In the respect of the time requirement, compared with the Goyal’s universal scheme, this new scheme could be more efficient. Regrettably, these improvements will increase the memory needed for the public parameters and the volume of communications required. Compromise values of the public parameters should therefore be chosen to balance the advantages and drawbacks.