Boneh/Franklin scheme
From Wikipedia, the free encyclopedia
The Boneh/Franklin scheme is an Identity based encryption system proposed by Dan Boneh and Matthew K. Franklin in 2001 [1]. This article refers to the protocol version called BasicIdent. It is an application of pairings (Weil pairing) over elliptic curves and finite fields.
Contents |
[edit] Groups and parameters
As the scheme bases upon pairings, all computations are performed in two groups
and
:
For
, let
be prime,
and consider the elliptic curve
over
. Note that this curve is not singular as
only equals
for the case
which is excluded by the additional constraint.
Let
be a prime factor of
(which is the order of
) and find a point
of order
.
is the set of points generated by
: 
is the subgroup of order
of
. We do not need to construct this group explicitly (this is done by the pairing) and thus don't have to find a generator.
[edit] Protocol description
[edit] Setup
The PKG chooses
- the public groups
(with generator
) and
as stated above, with the size of
depending on security parameter
, - the corresponding pairing
, - a random private master-key
, - a public key
, - a public hash function
, - a public hash function
for some fixed
and - the message space and the cipher space

[edit] Extract
To create the public key for
, the PKG computes
and- the private key
which is given to the user.
[edit] Encrypt
Given
, the ciphertext
is obtained as follows:
,- choose random
, - compute
and - set
.
Note that
is the PKG's public key and thus independent of the recipient's ID.
[edit] Decrypt
Given
, the plaintext can be retrieved using the private key:

[edit] Correctness
The primary step in both en- and decryption is to employ the pairing and
to generate a mask (like a symmetric key) that is xor'ed with the plaintext. So in order to verify correctness of the protocol, one has to verify that a honest sender and recipient end up with the same values here.
The encrypting entity uses
, while for decryption,
is applied. Due to the properties of pairings, it follows that:

[edit] Security
The security of the scheme depends on the hardness of the Bilinear Diffie-Hellman Problem (BDH) for the groups used. It has been proved that in a random-oracle model, the protocol is semantically secure under the BDH assumption.
[edit] Improvements
BasicIdent is is not chosen ciphertext secure. However, there is a universal transformation method due to Fujisaki and Okamoto that allows for conversion to a scheme having this property called FullIdent.
[edit] External Links
- Seminar 'Cryptography and Security in Banking'/'Alternative Cryptology', Ruhr University Bochum
- P(airing) B(ased) C(ryptography) library, designed by Ben Lynn et. al.
[edit] References
- ^ Dan Boneh, Matthew K. Franklin, Identity-Based Encryption from the Weil Pairing Advances in Cryptology - Proceedings of CRYPTO 2001 (2001)

