ID-based Encryption - Protocol Framework

Protocol Framework

Dan Boneh and Matthew K. Franklin defined a set of four algorithms that form a complete IBE system:

  • Setup: This algorithm is run by the PKG one time for creating the whole IBE environment. The master key is kept secret and used to derive users' private keys, while the system parameters are made public. It accepts a security parameter (i.e. binary length of key material) and outputs:
  1. A set of system parameters, including the message space and ciphertext space and ,
  2. a master key .
  • Extract: This algorithm is run by the PKG when a user requests his private key. Note that the verification of the authenticity of the requestor and the secure transport of are problems with which IBE protocols do not try to deal. It takes as input, and an identifier and returns the private key for user .
  • Encrypt: Takes, a message and and outputs the encryption .
  • Decrypt: Accepts, and and returns .

Read more about this topic:  ID-based Encryption

Famous quotes containing the word framework:

    The city is a fact in nature, like a cave, a run of mackerel or an ant-heap. But it is also a conscious work of art, and it holds within its communal framework many simpler and more personal forms of art. Mind takes form in the city; and in turn, urban forms condition mind.
    Lewis Mumford (1895–1990)