Lecture 17 - Diffie-Hellman key exchange, pairing, Identity-Based Encryption and Forward Security

نویسنده

  • Boaz Barak
چکیده

• n is prime. Then G is cyclic by Theorem 1. • n = pc for some prime p and c > 1. In this case if there is no element of order n, then all the orders must divide pc−1. We get n = pc elements x such that xp c−1 = 1, violating (*). • n = pq for co-prime p and q. In this case let H and F be two subgroups of G defined as follows: H = {a : ap = 1} and F = {b : bq = 1}. Then |H| ≤ p < n and |F | ≤ q < n and also as subgroups of G both H and F satisfy (*). Thus by the induction hypothesis both H and F are cyclic and have generators a and b respectively. We claim that ab generates the entire group G. Indeed, let c be any element in G. Since p, q are coprime, there are x, y such that xq+yp = 1 and hence c = cxq+yp. But (cxq)p = 1 and (cyp)q = 1 and hence c is a product of an element of H and an element of F , and hence c = aibj for some i ∈ {0, . . . , p− 1} and j ∈ {0, . . . , q − 1}. Thus, to show that c = (ab)z for some z all we need to do is to find z such that z = i (mod p) and z = j (mod q), but this can be done using the Chinese Remainder Theorem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption

A forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time. Forward security has several unique requirements in hierarchical identity-based encryption (HIBE) scheme: (1) users join dynamically; (2) encryption is joining-time-oblivious; (3) users evolve secret keys autonomously. We define and construct a scalable pairing-based forward-secure HIBE (fsHIBE...

متن کامل

A New Identity Based Encryption Scheme From Pairing

We construct an efficient identity based encryption scheme from pairing. The basic version of the new scheme is provably secure against chosen plaintext attack, and the full version of the new scheme is provably secure against adaptive chosen ciphertext attack. Our scheme is based on a new assumption (decision weak bilinear Diffie-Hellman assumption ) which is no stronger than decision bilinear...

متن کامل

Diffie-Hellman type key exchange protocols based on isogenies

‎In this paper‎, ‎we propose some Diffie-Hellman type key exchange protocols using isogenies of elliptic curves‎. ‎The first method which uses the endomorphism ring of an ordinary elliptic curve $ E $‎, ‎is a straightforward generalization of elliptic curve Diffie-Hellman key exchange‎. ‎The method uses commutativity of the endomorphism ring $ End(E) $‎. ‎Then using dual isogenies‎, ‎we propose...

متن کامل

ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks

ID-based encryption allows for a sender to encrypt a message to an identity without access to a public key certificate. Based on the bilinear pairing, Boneh and Franklin proposed the first practical IDbased encryption scheme and used the padding technique of FujisakiOkamto to extend it to be a chosen ciphertext secure version. In this letter, we would like to use another padding technique to pr...

متن کامل

Certificateless Public Key Encryption Without Pairing

“Certificateless Public Key Cryptography” has very appealing features, namely it does not require any public key certification (cf. traditional Public Key Cryptography) nor having key escrow problem (cf. Identity-Based Cryptography). Unfortunately, construction of Certificateless Public Key Encryption (CLPKE) schemes has so far depended on the use of Identity-Based Encryption, which results in ...

متن کامل

Efficient Identity-Based Signatures Secure in the Standard Model

The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based signatures. This folklore construction method leads to schemes that are somewhat inefficient and leaves open the problem of finding more efficient direct constructions. We present the first such construction. Our scheme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007