line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Crypt::PBC::WIBE; |
2
|
|
|
|
|
|
|
# ABSTRACT: Crypt::PBC::WIBE - Wildcarded Identity-based Encryption Scheme |
3
|
|
|
|
|
|
|
|
4
|
1
|
|
|
1
|
|
19757
|
use strict; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
34
|
|
5
|
1
|
|
|
1
|
|
5
|
use warnings; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
24
|
|
6
|
1
|
|
|
1
|
|
4
|
use Carp; |
|
1
|
|
|
|
|
5
|
|
|
1
|
|
|
|
|
79
|
|
7
|
1
|
|
|
1
|
|
319
|
use Crypt::PBC; |
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
8
|
|
|
|
|
|
|
|
9
|
|
|
|
|
|
|
use constant DEFAULT_PAIRING_A => <
|
10
|
|
|
|
|
|
|
type a |
11
|
|
|
|
|
|
|
q 8780710799663312522437781984754049815806883199414208211028653399266475630880222957078625179422662221423155858769582317459277713367317481324925129998224791 |
12
|
|
|
|
|
|
|
h 12016012264891146079388821366740534204802954401251311822919615131047207289359704531102844802183906537786776 |
13
|
|
|
|
|
|
|
r 730750818665451621361119245571504901405976559617 |
14
|
|
|
|
|
|
|
exp2 159 |
15
|
|
|
|
|
|
|
exp1 107 |
16
|
|
|
|
|
|
|
sign1 1 |
17
|
|
|
|
|
|
|
sign0 1 |
18
|
|
|
|
|
|
|
EOF |
19
|
|
|
|
|
|
|
|
20
|
|
|
|
|
|
|
=pod |
21
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
=encoding utf8 |
23
|
|
|
|
|
|
|
|
24
|
|
|
|
|
|
|
=head1 NAME |
25
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
Crypt::PBC::WIBE - Implementation of the Boneh-Gentry-Goh Wildcarded Identity-based Encryption scheme. |
27
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
=head1 SYNOPSIS |
29
|
|
|
|
|
|
|
|
30
|
|
|
|
|
|
|
use Crypt::PBC::WIBE; |
31
|
|
|
|
|
|
|
|
32
|
|
|
|
|
|
|
# Create a new instance, generate public, master secret key |
33
|
|
|
|
|
|
|
my $wibe = new Crypt::PBC::WIBE( L => 2 ); |
34
|
|
|
|
|
|
|
|
35
|
|
|
|
|
|
|
# Derive Key for Alice, Bob |
36
|
|
|
|
|
|
|
my $alice = $wibe->derive(1); |
37
|
|
|
|
|
|
|
my $bob = $wibe->derive(2); |
38
|
|
|
|
|
|
|
|
39
|
|
|
|
|
|
|
# Derive Subkey (notice: same ID!) for friend of alice |
40
|
|
|
|
|
|
|
my $carol = $alice->derive(1); |
41
|
|
|
|
|
|
|
|
42
|
|
|
|
|
|
|
# Recap: Alice now has the ID vector [1] |
43
|
|
|
|
|
|
|
# and carol (friend of alice) has [1,1] |
44
|
|
|
|
|
|
|
|
45
|
|
|
|
|
|
|
# Pattern: Allow all friends (*) |
46
|
|
|
|
|
|
|
my $pattern = ['*']; |
47
|
|
|
|
|
|
|
|
48
|
|
|
|
|
|
|
# Create a random element from Crypt::PBC |
49
|
|
|
|
|
|
|
my $msg = $wibe->pairing->init_GT->random; |
50
|
|
|
|
|
|
|
|
51
|
|
|
|
|
|
|
my $cipher = $wibe->encrypt_element($pattern, $msg); |
52
|
|
|
|
|
|
|
|
53
|
|
|
|
|
|
|
die "Alice should be able to decrypt" |
54
|
|
|
|
|
|
|
unless $alice->decrypt_element($cipher)->is_eq($msg); |
55
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
die "Carol must be unable to decrypt" |
57
|
|
|
|
|
|
|
if $carol->decrypt_element($cipher)->is_eq($msg); |
58
|
|
|
|
|
|
|
|
59
|
|
|
|
|
|
|
|
60
|
|
|
|
|
|
|
=head1 OVERVIEW |
61
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
This module provides an implementation to the Boneh–Boyen–Goh Wildcarded Identity-Based Encryption scheme |
63
|
|
|
|
|
|
|
as proposed by Abdalla et al., as appeared in I. |
64
|
|
|
|
|
|
|
|
65
|
|
|
|
|
|
|
This implementation relies on the PBC library and thus, its Perl bindings L. |
66
|
|
|
|
|
|
|
|
67
|
|
|
|
|
|
|
=head1 DISCLAIMER |
68
|
|
|
|
|
|
|
|
69
|
|
|
|
|
|
|
This module is part of a prototype implementation of the Boneh-Gentry-Goh WIBE. |
70
|
|
|
|
|
|
|
While it works fine in my tests, I advise against using it for anything productive other than experimental work. |
71
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
I appreciate your input on anything you might encounter while using this module. |
73
|
|
|
|
|
|
|
|
74
|
|
|
|
|
|
|
=head1 METHODS |
75
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
The exposed methods described below follow the four algorithms from the paper closely. |
77
|
|
|
|
|
|
|
|
78
|
|
|
|
|
|
|
=head2 new |
79
|
|
|
|
|
|
|
|
80
|
|
|
|
|
|
|
Returns a WIBE instance. C expects a parameter hash with at least the |
81
|
|
|
|
|
|
|
following pair set: |
82
|
|
|
|
|
|
|
|
83
|
|
|
|
|
|
|
=over 4 |
84
|
|
|
|
|
|
|
|
85
|
|
|
|
|
|
|
=item L |
86
|
|
|
|
|
|
|
|
87
|
|
|
|
|
|
|
Pattern length / Maximum hierarchy of the encryption scheme. |
88
|
|
|
|
|
|
|
|
89
|
|
|
|
|
|
|
=back |
90
|
|
|
|
|
|
|
|
91
|
|
|
|
|
|
|
and the following optional keys: |
92
|
|
|
|
|
|
|
|
93
|
|
|
|
|
|
|
=over 4 |
94
|
|
|
|
|
|
|
|
95
|
|
|
|
|
|
|
=item pairing |
96
|
|
|
|
|
|
|
|
97
|
|
|
|
|
|
|
A Type-A pairing. Passed directly to L. |
98
|
|
|
|
|
|
|
May be a pairing string, filehandle or filename. |
99
|
|
|
|
|
|
|
|
100
|
|
|
|
|
|
|
=item SK, MPK |
101
|
|
|
|
|
|
|
|
102
|
|
|
|
|
|
|
Secret and Public Key of the system. If not set, they |
103
|
|
|
|
|
|
|
are generated through C. |
104
|
|
|
|
|
|
|
|
105
|
|
|
|
|
|
|
=back |
106
|
|
|
|
|
|
|
|
107
|
|
|
|
|
|
|
=cut |
108
|
|
|
|
|
|
|
sub new { |
109
|
|
|
|
|
|
|
my $class = shift; |
110
|
|
|
|
|
|
|
my %options = @_; |
111
|
|
|
|
|
|
|
|
112
|
|
|
|
|
|
|
croak("Missing parameter 'L' from parameters.") |
113
|
|
|
|
|
|
|
unless defined $options{L}; |
114
|
|
|
|
|
|
|
|
115
|
|
|
|
|
|
|
croak("Invalid parameter 'L', must be an integer > 0.") |
116
|
|
|
|
|
|
|
unless ($options{L} > 0); |
117
|
|
|
|
|
|
|
|
118
|
|
|
|
|
|
|
my $self = bless { |
119
|
|
|
|
|
|
|
L => $options{L}, |
120
|
|
|
|
|
|
|
pairing => new Crypt::PBC($options{pairing} || DEFAULT_PAIRING_A), |
121
|
|
|
|
|
|
|
}, $class; |
122
|
|
|
|
|
|
|
|
123
|
|
|
|
|
|
|
# Use existing keys if set. |
124
|
|
|
|
|
|
|
$self->{$_} = $options{$_} for (qw(SK MPK DSK)); |
125
|
|
|
|
|
|
|
|
126
|
|
|
|
|
|
|
# If MPK is missing, we assume a new instance, generate keys. |
127
|
|
|
|
|
|
|
unless (defined $self->{MPK}) { |
128
|
|
|
|
|
|
|
$self->setup; |
129
|
|
|
|
|
|
|
} |
130
|
|
|
|
|
|
|
|
131
|
|
|
|
|
|
|
# Generate my own decryption key for patterns l+1 |
132
|
|
|
|
|
|
|
# By convention, we use ID=0 as the identifier for 'self'. |
133
|
|
|
|
|
|
|
# |
134
|
|
|
|
|
|
|
# I.e., Alice with ID=1 derives a key for [1,0], |
135
|
|
|
|
|
|
|
# so that she may decrypt a pattern of length 2. |
136
|
|
|
|
|
|
|
$self->{SK} = $self->key_derive(0) |
137
|
|
|
|
|
|
|
unless (defined $self->{SK}); |
138
|
|
|
|
|
|
|
|
139
|
|
|
|
|
|
|
return $self; |
140
|
|
|
|
|
|
|
} |
141
|
|
|
|
|
|
|
|
142
|
|
|
|
|
|
|
=head2 pairing |
143
|
|
|
|
|
|
|
|
144
|
|
|
|
|
|
|
Returns the Type-A pairing used in this WIBE instance. |
145
|
|
|
|
|
|
|
|
146
|
|
|
|
|
|
|
See L. |
147
|
|
|
|
|
|
|
|
148
|
|
|
|
|
|
|
=cut |
149
|
|
|
|
|
|
|
sub pairing { |
150
|
|
|
|
|
|
|
return shift->{pairing}; |
151
|
|
|
|
|
|
|
} |
152
|
|
|
|
|
|
|
|
153
|
|
|
|
|
|
|
=head2 setup |
154
|
|
|
|
|
|
|
|
155
|
|
|
|
|
|
|
Generates the I (public key) and I (master secret key) |
156
|
|
|
|
|
|
|
of the WIBE system and stores them in the WIBE instance. |
157
|
|
|
|
|
|
|
|
158
|
|
|
|
|
|
|
=cut |
159
|
|
|
|
|
|
|
sub setup { |
160
|
|
|
|
|
|
|
my ($self) = @_; |
161
|
|
|
|
|
|
|
|
162
|
|
|
|
|
|
|
# mpk = (g_1, g_2, h_1, u_0, .. , u_L) |
163
|
|
|
|
|
|
|
my ($mpk, $msk); |
164
|
|
|
|
|
|
|
|
165
|
|
|
|
|
|
|
# Choose random g_1, g_2 from G |
166
|
|
|
|
|
|
|
$mpk->{g1} = $self->{pairing}->init_G1->random; |
167
|
|
|
|
|
|
|
$mpk->{g2} = $self->{pairing}->init_G1->random; |
168
|
|
|
|
|
|
|
|
169
|
|
|
|
|
|
|
# Choose random alpha from Zp |
170
|
|
|
|
|
|
|
my $alpha = $self->{pairing}->init_Zr->random; |
171
|
|
|
|
|
|
|
|
172
|
|
|
|
|
|
|
# Compute h_1 as g_1^(alpha) |
173
|
|
|
|
|
|
|
$mpk->{h1} = $self->{pairing}->init_G1->pow_zn($mpk->{g1}, $alpha); |
174
|
|
|
|
|
|
|
|
175
|
|
|
|
|
|
|
# Choose random u_i for i = 0, .. , L |
176
|
|
|
|
|
|
|
for(my $i = 0; $i <= $self->{L}; $i++) { |
177
|
|
|
|
|
|
|
$mpk->{u}->[$i] = $self->{pairing}->init_G1->random; |
178
|
|
|
|
|
|
|
} |
179
|
|
|
|
|
|
|
|
180
|
|
|
|
|
|
|
# Initialize msk |
181
|
|
|
|
|
|
|
# msk = (d_0, d_1, ..., d_L, d_L+1) |
182
|
|
|
|
|
|
|
|
183
|
|
|
|
|
|
|
# Set d_0 to g_2 ^ alpha |
184
|
|
|
|
|
|
|
$msk->{key}->[0] = $self->{pairing}->init_G1; |
185
|
|
|
|
|
|
|
$msk->{key}->[0]->pow_zn($mpk->{g2}, $alpha); |
186
|
|
|
|
|
|
|
|
187
|
|
|
|
|
|
|
# Initialize all elements of msk as 1 in G |
188
|
|
|
|
|
|
|
for(my $i = 1; $i < $self->{L} + 2; $i++) { |
189
|
|
|
|
|
|
|
$msk->{key}->[$i] = $self->{pairing}->init_G1->set1; |
190
|
|
|
|
|
|
|
} |
191
|
|
|
|
|
|
|
|
192
|
|
|
|
|
|
|
|
193
|
|
|
|
|
|
|
# ID ids is empty, as this is the master |
194
|
|
|
|
|
|
|
$msk->{ids} = []; |
195
|
|
|
|
|
|
|
|
196
|
|
|
|
|
|
|
$self->{DSK} = $msk; |
197
|
|
|
|
|
|
|
$self->{MPK} = $mpk; |
198
|
|
|
|
|
|
|
|
199
|
|
|
|
|
|
|
} |
200
|
|
|
|
|
|
|
|
201
|
|
|
|
|
|
|
=head2 derive |
202
|
|
|
|
|
|
|
|
203
|
|
|
|
|
|
|
Returns a WIBE instance for a derived ID element. |
204
|
|
|
|
|
|
|
|
205
|
|
|
|
|
|
|
Required Parameters: |
206
|
|
|
|
|
|
|
|
207
|
|
|
|
|
|
|
=over 4 |
208
|
|
|
|
|
|
|
|
209
|
|
|
|
|
|
|
=item next_id |
210
|
|
|
|
|
|
|
|
211
|
|
|
|
|
|
|
Next Identifier element in the hierarchy. |
212
|
|
|
|
|
|
|
|
213
|
|
|
|
|
|
|
=back |
214
|
|
|
|
|
|
|
|
215
|
|
|
|
|
|
|
This serves as a shortcut for the following steps: |
216
|
|
|
|
|
|
|
|
217
|
|
|
|
|
|
|
=over 4 |
218
|
|
|
|
|
|
|
|
219
|
|
|
|
|
|
|
=item 1. |
220
|
|
|
|
|
|
|
|
221
|
|
|
|
|
|
|
Create a derived key C<key_derive(next_id)>>. |
222
|
|
|
|
|
|
|
|
223
|
|
|
|
|
|
|
=item 2. |
224
|
|
|
|
|
|
|
|
225
|
|
|
|
|
|
|
Create a new WIBE instance with the same public key and the derived secret key C |
226
|
|
|
|
|
|
|
|
227
|
|
|
|
|
|
|
=item 3. |
228
|
|
|
|
|
|
|
|
229
|
|
|
|
|
|
|
Returns that instance. |
230
|
|
|
|
|
|
|
|
231
|
|
|
|
|
|
|
=back |
232
|
|
|
|
|
|
|
|
233
|
|
|
|
|
|
|
=cut |
234
|
|
|
|
|
|
|
sub derive { |
235
|
|
|
|
|
|
|
my ($self, $next_id) = @_; |
236
|
|
|
|
|
|
|
|
237
|
|
|
|
|
|
|
# Derive the new key |
238
|
|
|
|
|
|
|
my $derived_key = $self->key_derive($next_id); |
239
|
|
|
|
|
|
|
|
240
|
|
|
|
|
|
|
# Pass that key, along with MPK, to a new instance |
241
|
|
|
|
|
|
|
my $options = { map { $_ => $self->{$_} } (qw(L MPK)) }; |
242
|
|
|
|
|
|
|
|
243
|
|
|
|
|
|
|
# If the instance ID vector is = L, it is a leaf, |
244
|
|
|
|
|
|
|
# thus it may no longer derive keys. |
245
|
|
|
|
|
|
|
# We denote that key as SK. |
246
|
|
|
|
|
|
|
|
247
|
|
|
|
|
|
|
if ($self->{L} == scalar(@{$derived_key->{ids}})) { |
248
|
|
|
|
|
|
|
$options->{SK} = $derived_key; |
249
|
|
|
|
|
|
|
} else { |
250
|
|
|
|
|
|
|
# Otherwise, the key is derivable (denoted as DSK). |
251
|
|
|
|
|
|
|
$options->{DSK} = $derived_key; |
252
|
|
|
|
|
|
|
} |
253
|
|
|
|
|
|
|
|
254
|
|
|
|
|
|
|
return Crypt::PBC::WIBE->new(%$options); |
255
|
|
|
|
|
|
|
} |
256
|
|
|
|
|
|
|
|
257
|
|
|
|
|
|
|
=head2 key_derive |
258
|
|
|
|
|
|
|
|
259
|
|
|
|
|
|
|
Derive a key for the given ID element |
260
|
|
|
|
|
|
|
using the derivable secret key I<(DSK)> of this instance. |
261
|
|
|
|
|
|
|
|
262
|
|
|
|
|
|
|
Parameters: |
263
|
|
|
|
|
|
|
|
264
|
|
|
|
|
|
|
=over 4 |
265
|
|
|
|
|
|
|
|
266
|
|
|
|
|
|
|
=item id |
267
|
|
|
|
|
|
|
|
268
|
|
|
|
|
|
|
Next Identifier element in the hierarchy. |
269
|
|
|
|
|
|
|
|
270
|
|
|
|
|
|
|
=back |
271
|
|
|
|
|
|
|
|
272
|
|
|
|
|
|
|
Returns the derived key of size (sk - 1), |
273
|
|
|
|
|
|
|
which is a simple hash with the following keys: |
274
|
|
|
|
|
|
|
|
275
|
|
|
|
|
|
|
=over 4 |
276
|
|
|
|
|
|
|
|
277
|
|
|
|
|
|
|
=item key |
278
|
|
|
|
|
|
|
|
279
|
|
|
|
|
|
|
The element_t secret key for the derived ID. |
280
|
|
|
|
|
|
|
|
281
|
|
|
|
|
|
|
=item ids |
282
|
|
|
|
|
|
|
|
283
|
|
|
|
|
|
|
Hierarchy of the secret key. |
284
|
|
|
|
|
|
|
|
285
|
|
|
|
|
|
|
=back |
286
|
|
|
|
|
|
|
|
287
|
|
|
|
|
|
|
B |
288
|
|
|
|
|
|
|
|
289
|
|
|
|
|
|
|
=over 4 |
290
|
|
|
|
|
|
|
|
291
|
|
|
|
|
|
|
=item * |
292
|
|
|
|
|
|
|
|
293
|
|
|
|
|
|
|
Alice derives an identity 1 (Zp) for Bob |
294
|
|
|
|
|
|
|
using the Master Key. (size |L| + 2) |
295
|
|
|
|
|
|
|
|
296
|
|
|
|
|
|
|
=item * |
297
|
|
|
|
|
|
|
|
298
|
|
|
|
|
|
|
Bob receives a secret key of size |L| + 1 |
299
|
|
|
|
|
|
|
and its identity. |
300
|
|
|
|
|
|
|
|
301
|
|
|
|
|
|
|
=item * |
302
|
|
|
|
|
|
|
Bob derives an identity 0 (Zp) for Bob |
303
|
|
|
|
|
|
|
(i.e., the self key). |
304
|
|
|
|
|
|
|
|
305
|
|
|
|
|
|
|
Bob can decrypt for Pattern [1,*] or [1,0]. |
306
|
|
|
|
|
|
|
|
307
|
|
|
|
|
|
|
=back |
308
|
|
|
|
|
|
|
|
309
|
|
|
|
|
|
|
=cut |
310
|
|
|
|
|
|
|
sub key_derive { |
311
|
|
|
|
|
|
|
my ($self, $ID) = @_; |
312
|
|
|
|
|
|
|
|
313
|
|
|
|
|
|
|
# Use the DSK unless key is set |
314
|
|
|
|
|
|
|
croak("Cannot derive key without DSK.") |
315
|
|
|
|
|
|
|
unless defined $self->{DSK}; |
316
|
|
|
|
|
|
|
|
317
|
|
|
|
|
|
|
croak("ID must be an integer >= 0") |
318
|
|
|
|
|
|
|
unless ($ID =~ qr/^\d+$/ && $ID >= 0); |
319
|
|
|
|
|
|
|
|
320
|
|
|
|
|
|
|
# Load next ID element in Zp |
321
|
|
|
|
|
|
|
my $ID_el = $self->{pairing}->init_Zr->set_to_int($ID); |
322
|
|
|
|
|
|
|
|
323
|
|
|
|
|
|
|
# l = Current ID vector length |
324
|
|
|
|
|
|
|
my $l = scalar(@{ $self->{DSK}->{ids} }); |
325
|
|
|
|
|
|
|
# Length of DSK |
326
|
|
|
|
|
|
|
my $keylen = scalar(@{ $self->{DSK}->{key} }); |
327
|
|
|
|
|
|
|
# Length of derived key = l - 1 |
328
|
|
|
|
|
|
|
my $derived_keylen = $keylen - 1; |
329
|
|
|
|
|
|
|
|
330
|
|
|
|
|
|
|
# secret key = (d_0, d_l+1, ..., d_L, d_L+1) |
331
|
|
|
|
|
|
|
# new key = (d_0', d_l+2', ..., d_L, d_L+1) |
332
|
|
|
|
|
|
|
my $derived; |
333
|
|
|
|
|
|
|
|
334
|
|
|
|
|
|
|
# Initialize all elements of the derived key in G |
335
|
|
|
|
|
|
|
for(my $i = 0; $i < $derived_keylen; $i++) { |
336
|
|
|
|
|
|
|
$derived->[$i] = $self->{pairing}->init_G1; |
337
|
|
|
|
|
|
|
} |
338
|
|
|
|
|
|
|
|
339
|
|
|
|
|
|
|
# Compute IDs |
340
|
|
|
|
|
|
|
my $derived_ids = [ @{$self->{DSK}->{ids}}, $ID]; |
341
|
|
|
|
|
|
|
|
342
|
|
|
|
|
|
|
# Initialize r as random from Zp |
343
|
|
|
|
|
|
|
my $r = $self->{pairing}->init_Zr->random; |
344
|
|
|
|
|
|
|
my $temp = $self->{pairing}->init_G1; |
345
|
|
|
|
|
|
|
|
346
|
|
|
|
|
|
|
# Compute d_0' |
347
|
|
|
|
|
|
|
$derived->[0]->set($self->{MPK}->{u}->[0]); |
348
|
|
|
|
|
|
|
my $id_i = $self->{pairing}->init_Zr; |
349
|
|
|
|
|
|
|
|
350
|
|
|
|
|
|
|
for(my $i = 0; $i < $l + 1; $i++) { |
351
|
|
|
|
|
|
|
$id_i->set_to_int($derived_ids->[$i]); |
352
|
|
|
|
|
|
|
# multiply with u_i ^ ID_i-1 |
353
|
|
|
|
|
|
|
$temp->pow_zn($self->{MPK}->{u}->[$i+1], $id_i); |
354
|
|
|
|
|
|
|
$derived->[0]->mul($temp); |
355
|
|
|
|
|
|
|
} |
356
|
|
|
|
|
|
|
|
357
|
|
|
|
|
|
|
# Lastly pow with r |
358
|
|
|
|
|
|
|
$derived->[0]->pow_zn($r); |
359
|
|
|
|
|
|
|
|
360
|
|
|
|
|
|
|
# compute d_l+1 ^ ID_l+1 |
361
|
|
|
|
|
|
|
$temp->set($self->{DSK}->{key}->[1]); |
362
|
|
|
|
|
|
|
$temp->pow_zn($ID_el); |
363
|
|
|
|
|
|
|
|
364
|
|
|
|
|
|
|
# Multiply with temp |
365
|
|
|
|
|
|
|
$derived->[0]->mul($temp); |
366
|
|
|
|
|
|
|
|
367
|
|
|
|
|
|
|
# Multiply with d_0 |
368
|
|
|
|
|
|
|
$derived->[0]->mul($self->{DSK}->{key}->[0]); |
369
|
|
|
|
|
|
|
|
370
|
|
|
|
|
|
|
# Compute d_i' for i=1,..,len-2 of derived key |
371
|
|
|
|
|
|
|
for (my $i = 2; $i < $keylen - 1; $i++) { |
372
|
|
|
|
|
|
|
|
373
|
|
|
|
|
|
|
# Set d_i' to d_(i) * u_(l+i) ^ r |
374
|
|
|
|
|
|
|
# multiply with u_(l+i) |
375
|
|
|
|
|
|
|
$derived->[$i - 1]->pow_zn($self->{MPK}->{u}->[$l + $i], $r); |
376
|
|
|
|
|
|
|
$derived->[$i - 1]->mul($self->{DSK}->{key}->[$i]); |
377
|
|
|
|
|
|
|
} |
378
|
|
|
|
|
|
|
|
379
|
|
|
|
|
|
|
# Finally, compute d_L+1' as (g_1 ^ r) * d_L+1 |
380
|
|
|
|
|
|
|
$derived->[$derived_keylen - 1]->pow_zn($self->{MPK}->{g1}, $r); |
381
|
|
|
|
|
|
|
$derived->[$derived_keylen - 1]->mul($self->{DSK}->{key}->[$keylen - 1]); |
382
|
|
|
|
|
|
|
|
383
|
|
|
|
|
|
|
return { |
384
|
|
|
|
|
|
|
ids => $derived_ids, |
385
|
|
|
|
|
|
|
key => $derived |
386
|
|
|
|
|
|
|
}; |
387
|
|
|
|
|
|
|
} |
388
|
|
|
|
|
|
|
|
389
|
|
|
|
|
|
|
=head2 encrypt_element |
390
|
|
|
|
|
|
|
|
391
|
|
|
|
|
|
|
Perform an encryption for an element in G1 using the WIBE scheme. |
392
|
|
|
|
|
|
|
|
393
|
|
|
|
|
|
|
This key may later be expanded using HKDF and used in a symmetric AE scheme |
394
|
|
|
|
|
|
|
as a hybrid encryption scheme. |
395
|
|
|
|
|
|
|
|
396
|
|
|
|
|
|
|
Parameters: |
397
|
|
|
|
|
|
|
|
398
|
|
|
|
|
|
|
=over 4 |
399
|
|
|
|
|
|
|
|
400
|
|
|
|
|
|
|
=item Pattern |
401
|
|
|
|
|
|
|
|
402
|
|
|
|
|
|
|
An arrayref of size L with one of: |
403
|
|
|
|
|
|
|
1.) C<'*'>, wildcard. Can be derived by any containing the parent pattern |
404
|
|
|
|
|
|
|
2.) An Identifier (int >= 0). Derived only by the owner of that identifier. |
405
|
|
|
|
|
|
|
|
406
|
|
|
|
|
|
|
B: For L=2, possible patterns are: |
407
|
|
|
|
|
|
|
|
408
|
|
|
|
|
|
|
=over 4 |
409
|
|
|
|
|
|
|
|
410
|
|
|
|
|
|
|
=item * |
411
|
|
|
|
|
|
|
|
412
|
|
|
|
|
|
|
C<['*','*']>: Decrypt possible with patterns matching C<'X.*'> or C<'X.Y'> for any C. |
413
|
|
|
|
|
|
|
|
414
|
|
|
|
|
|
|
=item * |
415
|
|
|
|
|
|
|
|
416
|
|
|
|
|
|
|
C<['X','*']>: Decrypt possible for X and any subkeys of id C. |
417
|
|
|
|
|
|
|
|
418
|
|
|
|
|
|
|
=item * |
419
|
|
|
|
|
|
|
|
420
|
|
|
|
|
|
|
C<['X', 0 ]>: Decrypt possible for subkey 0 of C, which by convention is C. |
421
|
|
|
|
|
|
|
|
422
|
|
|
|
|
|
|
=back |
423
|
|
|
|
|
|
|
|
424
|
|
|
|
|
|
|
=item m |
425
|
|
|
|
|
|
|
|
426
|
|
|
|
|
|
|
An element of G1 to encrypt. |
427
|
|
|
|
|
|
|
|
428
|
|
|
|
|
|
|
=back |
429
|
|
|
|
|
|
|
|
430
|
|
|
|
|
|
|
The resulting ciphertext of the encryption is a hashref. |
431
|
|
|
|
|
|
|
|
432
|
|
|
|
|
|
|
=cut |
433
|
|
|
|
|
|
|
sub encrypt_element { |
434
|
|
|
|
|
|
|
my ($self, $pattern, $m) = @_; |
435
|
|
|
|
|
|
|
|
436
|
|
|
|
|
|
|
croak("Pattern must be of length <= " . $self->{L}) |
437
|
|
|
|
|
|
|
unless (scalar(@$pattern) <= $self->{L}); |
438
|
|
|
|
|
|
|
|
439
|
|
|
|
|
|
|
for my $id (@$pattern) { |
440
|
|
|
|
|
|
|
croak("Pattern must only either an * or an integer >= 0") |
441
|
|
|
|
|
|
|
unless ($id eq '*' || $id >= 0); |
442
|
|
|
|
|
|
|
} |
443
|
|
|
|
|
|
|
|
444
|
|
|
|
|
|
|
croak("Cannot encrypt without a public key.") |
445
|
|
|
|
|
|
|
unless defined $self->{MPK}; |
446
|
|
|
|
|
|
|
|
447
|
|
|
|
|
|
|
# cipher = (P, C1, C2, C3, C4) |
448
|
|
|
|
|
|
|
my $cipher; |
449
|
|
|
|
|
|
|
|
450
|
|
|
|
|
|
|
$cipher->{P} = $pattern; |
451
|
|
|
|
|
|
|
|
452
|
|
|
|
|
|
|
my $r = $self->{pairing}->init_Zr->random; |
453
|
|
|
|
|
|
|
|
454
|
|
|
|
|
|
|
# Initialize C1 as g_1 ^ r |
455
|
|
|
|
|
|
|
$cipher->{C1} = $self->{pairing}->init_G1; |
456
|
|
|
|
|
|
|
$cipher->{C1}->pow_zn($self->{MPK}->{g1}, $r); |
457
|
|
|
|
|
|
|
|
458
|
|
|
|
|
|
|
# Compute C2 and C4 |
459
|
|
|
|
|
|
|
$cipher->{C2} = $self->{pairing}->init_G1; |
460
|
|
|
|
|
|
|
$cipher->{C2}->set($self->{MPK}->{u}->[0]); |
461
|
|
|
|
|
|
|
# C4 denotes a vector of length |pattern| |
462
|
|
|
|
|
|
|
|
463
|
|
|
|
|
|
|
my $temp = $self->{pairing}->init_G1; |
464
|
|
|
|
|
|
|
my $p_i = $self->{pairing}->init_Zr; |
465
|
|
|
|
|
|
|
for (my $i = 0; $i < scalar(@$pattern); $i++) { |
466
|
|
|
|
|
|
|
if ($pattern->[$i] eq '*') { |
467
|
|
|
|
|
|
|
# Set C4[i] to u_i ^ r |
468
|
|
|
|
|
|
|
$cipher->{C4}->[$i] = $self->{pairing}->init_G1; |
469
|
|
|
|
|
|
|
$cipher->{C4}->[$i]->pow_zn($self->{MPK}->{u}->[$i+1], $r); |
470
|
|
|
|
|
|
|
} else { |
471
|
|
|
|
|
|
|
# that is not a wildcard |
472
|
|
|
|
|
|
|
$p_i->set_to_int($pattern->[$i]); |
473
|
|
|
|
|
|
|
$temp->pow_zn($self->{MPK}->{u}->[$i+1], $p_i); |
474
|
|
|
|
|
|
|
$cipher->{C2}->mul($temp); |
475
|
|
|
|
|
|
|
} |
476
|
|
|
|
|
|
|
} |
477
|
|
|
|
|
|
|
|
478
|
|
|
|
|
|
|
# Finalize C2 as C2 ^ r |
479
|
|
|
|
|
|
|
$cipher->{C2}->pow_zn($r); |
480
|
|
|
|
|
|
|
|
481
|
|
|
|
|
|
|
# Compute C3 as m * e(h1, g2)^3 |
482
|
|
|
|
|
|
|
$cipher->{C3} = $self->{pairing}->init_GT; |
483
|
|
|
|
|
|
|
$cipher->{C3}->pairing_apply($self->{MPK}->{h1}, $self->{MPK}->{g2}); |
484
|
|
|
|
|
|
|
$cipher->{C3}->pow_zn($r); |
485
|
|
|
|
|
|
|
$cipher->{C3}->mul($m); |
486
|
|
|
|
|
|
|
|
487
|
|
|
|
|
|
|
return $cipher; |
488
|
|
|
|
|
|
|
} |
489
|
|
|
|
|
|
|
|
490
|
|
|
|
|
|
|
=head2 decrypt_element |
491
|
|
|
|
|
|
|
|
492
|
|
|
|
|
|
|
Recover the element of GT from the given ciphertext. |
493
|
|
|
|
|
|
|
|
494
|
|
|
|
|
|
|
Required parameters: |
495
|
|
|
|
|
|
|
|
496
|
|
|
|
|
|
|
=over 4 |
497
|
|
|
|
|
|
|
|
498
|
|
|
|
|
|
|
=item Ciphertext |
499
|
|
|
|
|
|
|
|
500
|
|
|
|
|
|
|
The ciphertext is a hashref with (P,C1,..C4) keys, |
501
|
|
|
|
|
|
|
as returned from the C method. |
502
|
|
|
|
|
|
|
|
503
|
|
|
|
|
|
|
=back |
504
|
|
|
|
|
|
|
|
505
|
|
|
|
|
|
|
To decrypt, the secret key (SK) is used. It must be of hierarchy length >= |P| in |
506
|
|
|
|
|
|
|
order to be able to decrypt the pattern. |
507
|
|
|
|
|
|
|
|
508
|
|
|
|
|
|
|
Returns an element of GT. |
509
|
|
|
|
|
|
|
L |
510
|
|
|
|
|
|
|
to determine the success or failure of the decryption. |
511
|
|
|
|
|
|
|
|
512
|
|
|
|
|
|
|
=cut |
513
|
|
|
|
|
|
|
sub decrypt_element { |
514
|
|
|
|
|
|
|
my ($self, $cipher) = @_; |
515
|
|
|
|
|
|
|
|
516
|
|
|
|
|
|
|
croak("Cannot decrypt without secret key") unless (defined $self->{SK}); |
517
|
|
|
|
|
|
|
|
518
|
|
|
|
|
|
|
my $pattern_len = scalar(@{$cipher->{P}}); |
519
|
|
|
|
|
|
|
my $key_hierarchy_len = scalar(@{$self->{SK}->{ids}}); |
520
|
|
|
|
|
|
|
|
521
|
|
|
|
|
|
|
croak("Cannot decrypt pattern of length " . $pattern_len |
522
|
|
|
|
|
|
|
. ", ID hierarchy too small: " . $key_hierarchy_len) |
523
|
|
|
|
|
|
|
unless $key_hierarchy_len >= $pattern_len; |
524
|
|
|
|
|
|
|
|
525
|
|
|
|
|
|
|
for my $id ($cipher->{P}) { |
526
|
|
|
|
|
|
|
croak("Pattern must only either an * or an integer >= 0") |
527
|
|
|
|
|
|
|
unless ($id eq '*' || $id >= 0); |
528
|
|
|
|
|
|
|
} |
529
|
|
|
|
|
|
|
|
530
|
|
|
|
|
|
|
my $c_2n = $self->{pairing}->init_G1; |
531
|
|
|
|
|
|
|
my $temp = $self->{pairing}->init_G1; |
532
|
|
|
|
|
|
|
# Initialize C2' as C2 |
533
|
|
|
|
|
|
|
$c_2n->set($cipher->{C2}); |
534
|
|
|
|
|
|
|
|
535
|
|
|
|
|
|
|
# Prepare IDs from ids |
536
|
|
|
|
|
|
|
my $ID_el = $self->{pairing}->init_Zr; |
537
|
|
|
|
|
|
|
|
538
|
|
|
|
|
|
|
for (my $i = 0; $i < $pattern_len; $i++) { |
539
|
|
|
|
|
|
|
if ($cipher->{P}->[$i] eq '*') { |
540
|
|
|
|
|
|
|
# Compute v_i ^ ID_i for each i in p that is a wildcard |
541
|
|
|
|
|
|
|
$ID_el->set_to_int($self->{SK}->{ids}->[$i]); |
542
|
|
|
|
|
|
|
$temp->pow_zn($cipher->{C4}->[$i], $ID_el); |
543
|
|
|
|
|
|
|
$c_2n->mul($temp); |
544
|
|
|
|
|
|
|
} |
545
|
|
|
|
|
|
|
} |
546
|
|
|
|
|
|
|
|
547
|
|
|
|
|
|
|
# Compute m as C3 * e(C2', d_L+1) / e(C1, d_0) |
548
|
|
|
|
|
|
|
my $m = $self->{pairing}->init_GT; |
549
|
|
|
|
|
|
|
my $tempGT = $self->{pairing}->init_GT; |
550
|
|
|
|
|
|
|
|
551
|
|
|
|
|
|
|
my $keylen = scalar(@{$self->{SK}->{key}}); |
552
|
|
|
|
|
|
|
$m->pairing_apply($c_2n, $self->{SK}->{key}->[$keylen - 1]); |
553
|
|
|
|
|
|
|
$tempGT->pairing_apply($cipher->{C1}, $self->{SK}->{key}->[0]); |
554
|
|
|
|
|
|
|
$m->div($tempGT); |
555
|
|
|
|
|
|
|
$m->mul($cipher->{C3}); |
556
|
|
|
|
|
|
|
|
557
|
|
|
|
|
|
|
return $m; |
558
|
|
|
|
|
|
|
} |
559
|
|
|
|
|
|
|
|
560
|
|
|
|
|
|
|
=head1 AUTHOR |
561
|
|
|
|
|
|
|
|
562
|
|
|
|
|
|
|
Oliver Günther |
563
|
|
|
|
|
|
|
|
564
|
|
|
|
|
|
|
=head1 COPYRIGHT |
565
|
|
|
|
|
|
|
|
566
|
|
|
|
|
|
|
Copyright (C) 2014 by Oliver Günther |
567
|
|
|
|
|
|
|
|
568
|
|
|
|
|
|
|
This program is free software: you can redistribute it and/or modify |
569
|
|
|
|
|
|
|
it under the terms of the GNU General Public License as published by |
570
|
|
|
|
|
|
|
the Free Software Foundation, either version 3 of the License, or |
571
|
|
|
|
|
|
|
(at your option) any later version. |
572
|
|
|
|
|
|
|
|
573
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful, |
574
|
|
|
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of |
575
|
|
|
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
576
|
|
|
|
|
|
|
GNU General Public License for more details. |
577
|
|
|
|
|
|
|
|
578
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License |
579
|
|
|
|
|
|
|
along with this program. If not, see . |
580
|
|
|
|
|
|
|
|
581
|
|
|
|
|
|
|
=head1 SEE ALSO |
582
|
|
|
|
|
|
|
|
583
|
|
|
|
|
|
|
L |
584
|
|
|
|
|
|
|
|
585
|
|
|
|
|
|
|
L |
586
|
|
|
|
|
|
|
|
587
|
|
|
|
|
|
|
L |
588
|
|
|
|
|
|
|
|
589
|
|
|
|
|
|
|
=cut |
590
|
|
|
|
|
|
|
|
591
|
|
|
|
|
|
|
1; |