ID-based Encryption - Protocol Framework

Protocol Framework

Dan Boneh and Matthew K. Franklin defined a set of four algorithms that form a complete IBE system:

  • Setup: This algorithm is run by the PKG one time for creating the whole IBE environment. The master key is kept secret and used to derive users' private keys, while the system parameters are made public. It accepts a security parameter (i.e. binary length of key material) and outputs:
  1. A set of system parameters, including the message space and ciphertext space and ,
  2. a master key .
  • Extract: This algorithm is run by the PKG when a user requests his private key. Note that the verification of the authenticity of the requestor and the secure transport of are problems with which IBE protocols do not try to deal. It takes as input, and an identifier and returns the private key for user .
  • Encrypt: Takes, a message and and outputs the encryption .
  • Decrypt: Accepts, and and returns .

Read more about this topic:  ID-based Encryption

Famous quotes containing the word framework:

    Seeing our common-sense conceptual framework for mental phenomena as a theory brings a simple and unifying organization to most of the major topics in the philosophy of mind.
    Paul M. Churchland (b. 1942)