ID-based Encryption - Protocol Framework

Protocol Framework

Dan Boneh and Matthew K. Franklin defined a set of four algorithms that form a complete IBE system:

  • Setup: This algorithm is run by the PKG one time for creating the whole IBE environment. The master key is kept secret and used to derive users' private keys, while the system parameters are made public. It accepts a security parameter (i.e. binary length of key material) and outputs:
  1. A set of system parameters, including the message space and ciphertext space and ,
  2. a master key .
  • Extract: This algorithm is run by the PKG when a user requests his private key. Note that the verification of the authenticity of the requestor and the secure transport of are problems with which IBE protocols do not try to deal. It takes as input, and an identifier and returns the private key for user .
  • Encrypt: Takes, a message and and outputs the encryption .
  • Decrypt: Accepts, and and returns .

Read more about this topic:  ID-based Encryption

Famous quotes containing the word framework:

    Most young black females learn to be suspicious and critical of feminist thinking long before they have any clear understanding of its theory and politics.... Without rigorously engaging feminist thought, they insist that racial separatism works best. This attitude is dangerous. It not only erases the reality of common female experience as a basis for academic study; it also constructs a framework in which differences cannot be examined comparatively.
    bell hooks (b. c. 1955)