Boneh–Franklin scheme explained

The Boneh–Franklin scheme is an identity-based encryption system proposed by Dan Boneh and Matthew K. Franklin in 2001.[1] This article refers to the protocol version called BasicIdent. It is an application of pairings (Weil pairing) over elliptic curves and finite fields.

Groups and parameters

As the scheme is based upon pairings, all computations are performed in two groups,

styleG1

and

styleG2

:

For

styleG1

, let

stylep

be prime,

stylep\equiv2\mod3

and consider the elliptic curve

styleE:y2=x3+1

over

styleZ/pZ

. Note that this curve is not singular as

style4a3+27b2=27=33

only equals

style0

for the case

stylep=3

which is excluded by the additional constraint.

Let

styleq>3

be a prime factor of

stylep+1

(which is the order of

styleE

) and find a point

styleP\inE

of order

styleq

.

styleG1

is the set of points generated by

styleP

:

style\left\{nP\|n\in\left\{0,\ldots,q-1\right\}\right\}

styleG2

is the subgroup of order

styleq

of

styleGF\left(p2\right)*

. We do not need to construct this group explicitly (this is done by the pairing) and thus don't have to find a generator.

styleG1

is considered an additive group, being a subgroup of the additive group of points of

styleE

, while

styleG2

is considered a multiplicative group, being a subgroup of the multiplicative group of the finite field

styleGF(p2)*

.

Protocol description

Setup

The public key generator (PKG) chooses:

  1. the public groups

styleG1

(with generator

styleP

) and

styleG2

as stated above, with the size of

styleq

depending on security parameter

stylek

,
  1. the corresponding pairing

stylee

,
  1. a random private master-key

styleKm=s\in

*
Z
q
,
  1. a public key

styleKpub=sP

,
  1. a public hash function

styleH1:\left\{0,1\right\}*

*
G
1
,
  1. a public hash function

styleH2:G2\left\{0,1\right\}n

for some fixed

stylen

and

stylel{M}=\left\{0,1\right\}n,l{C}=

*
G
1

x \left\{0,1\right\}n

Extraction

To create the public key for

styleID\in\left\{0,1\right\}*

, the PKG computes

styleQID=H1\left(ID\right)

and
  1. the private key

styledID=sQID

which is given to the user.

Encryption

Given

stylem\inl{M}

, the ciphertext

stylec

is obtained as follows:

styleQID=H1\left(ID\right)\in

*
G
1
,
  1. choose random

styler\in

*
Z
q
,
  1. compute

stylegID=e\left(QID,Kpub\right)\inG2

and
  1. set

stylec=\left(rP,mH2\left(g

r\right)\right)
ID
.

Note that

styleKpub

is the PKG's public key and thus independent of the recipient's ID.

Decryption

Given

stylec=\left(u,v\right)\inl{C}

, the plaintext can be retrieved using the private key:

stylem=vH2\left(e\left(dID,u\right)\right)

Correctness

The primary step in both encryption and decryption is to employ the pairing and

styleH2

to generate a mask (like a symmetric key) that is xor'ed with the plaintext. So in order to verify correctness of the protocol, one has to verify that an honest sender and recipient end up with the same values here.

The encrypting entity uses

styleH2\left(g

r\right)
ID
, while for decryption,

styleH2\left(e\left(dID,u\right)\right)

is applied. Due to the properties of pairings, it follows that:

\begin{align} H2\left(e\left(dID,u\right)\right)&=H2\left(e\left(sQID,rP\right)\right)\\ &=H2\left(e\left(QID,P\right)rs\right)\\ &=H2\left(e\left(QID,sP\right)r\right)\\ &=H2\left(e\left(QID,Kpub\right)r\right)\\ &=H2\left(

r
g
ID

\right)\\ \end{align}

Security

The security of the scheme depends on the hardness of the bilinear Diffie-Hellman problem (BDH) for the groups used. It has been proved that in a random-oracle model, the protocol is semantically secure under the BDH assumption.

Improvements

BasicIdent is not chosen ciphertext secure. However, there is a universal transformation method due to Fujisaki and Okamoto[2] that allows for conversion to a scheme having this property called FullIdent.

References

  1. Dan Boneh, Matthew K. Franklin, "Identity-Based Encryption from the Weil Pairing", Advances in Cryptology – Proceedings of CRYPTO 2001 (2001)
  2. Eiichiro Fujisaki, Tatsuaki Okamoto, "Secure Integration of Asymmetric and Symmetric Encryption Schemes", Advances in Cryptology – Proceedings of CRYPTO 99 (1999). Full version appeared in J. Cryptol. (2013) 26: 80–101

External links