ing pairing-friendly curves) are the main reasons hin-
dering the wide use of IBE. The latter is due to the
fact that the most efficient and practical IBE schemes
are currently based on bilinear pairings over elliptic
curve groups for which pairing-friendly elliptic curve
groups have been proposed. The first companies have
already started to exploit IBE commercially. Some
of them are Voltage, Trend Micro, Mitsubishi and
Noretech Microsoft etc. All in all, due to the chal-
lenges that appear in asymmetric encryption, the issue
of moving from one model to another requires much
more attention in order for new schemes, with various
interesting properties, to be widely spread.
From the aforementioned encryption models,
CLE owns some interesting properties making it a
strong candidate to be the ‘connector’ between tradi-
tional public key encryption and IBE. In fact, a CLE
scheme could be characterized as a mixed scheme
which shares properties from both encryption mod-
els, conventional and IBE. As far as CLE and IBE are
concerned, after a thorough research we found that
there are currently at least 35 different concrete IBE
schemes and 30 concrete CLE schemes in the liter-
ature. There are also generic CLE schemes that can
be derived from IBE. Moreover, some of the existing
protocols are independent (Sun et al., 2007), (Cocks,
2001), but some of them share certain features which
allow us to put the concept of compatibility into prac-
tice. So in the following sections, we propose specific
protocols exploring IBE and CLE concepts.
1.1 Classes of IBE
Taking into consideration the similarities, as well as
the differences of numerous IBE proposals, we tried
to organize them into classes. As a result, eight
IBE classes have been modeled in Table 1. Note
that the classes can be generalize into less classes
since Gentry, Sakai-Kashara and BB2 classes belong
to the Exponent-inversion family. Moreover, Waters
and BB1 classes both derive from the commutative-
blinding framework and KW class stems from a full-
domain-hash IBE. We pointed out which of them are
useful or not. The representative scheme of each class
is the first proposed scheme in the literature. There-
fore, the names of the classes derived from the cor-
responding authors’ names of the initial paper for
each approach which does not automatically mean
that these schemes are or are not the best performed
paradigms in their class. This classification depends
on the structure of the keys. Furthermore, we had to
pay attention to the mathematical problems (security
assumptions) on which the security of every scheme
dependson. In Table 1, Msk isthe master secret key of
KGC, Pub is the user’s public key, Priv is the user’s
private key and Gener is a specified generator. The
differences of the keys are obvious.
1.2 Classes of CLE
In an attempt to standardize the closely related CLE
with IBE proposals we classify the CLE schemes into
eight classes. As in the IBE classification, this clas-
sification depends on the structure of the keys and
the security assumptions on which every scheme de-
pends. The eight different classes are depicted in Ta-
ble 2. We emphasize on which of them are useful or
not for comparison and compatibility testing.
1.3 Compatibility
Considering the structure of the keys derived from
CLE classes we set the compatible classes. Table 3
shows the CLE classes corresponding to their IBE
compatible class. By taking into consideration the
competitive and compatible useful classes, the com-
patibility can be put into practice. If the ROM and of
course the Weak-Types of Adversarial Security Mod-
els are considered practically secure, according to
our performance analysis, the SK (Kasahara, 2003)
class has the best efficiency performance, followed
by BB2 and Gentry classes which are proven se-
cure in the standard model. In CLE, among the use-
ful classes, the best performed class is the LQ (Lib-
ert and jacques Quisquater, 2006) class, followed by
AP05 and CCLC classes. The LQ (Libert and jacques
Quisquater, 2006) class is compatible with SK-IBE
class. Depending on their keys and on the security
assumptions they lead to a mixed CLE-IBE system.
Both classes support the simplest implementations. A
drawback of these classes is that the security depends
on a strongest q-BDHI assumption compared to other
classes. We highlight though that our measurements
took under consideration the case of a single KGC,
otherwise some other pairing-based classes could be
benefited from the bilinearity property when multiple
KGCs are to be used. We are currently investigate
the case of multiple KGCs and its effect on the com-
patibility and on the performance of IBE and CLE
schemes. In a multiple KGCs approach, we need to
split the master secret key into additive or polynomial
shares to avoid single points of failure. On the other
hand, a less time efficient commutative blinding BB1
scheme is extremely flexible as well as versatile to im-
plement extensions of IBE followed by BF schemes.
Thus, another mixed CLE-IBE system could be de-
rived from BB1 and CCLC classes sacrificing some of
its efficiency. The combination of BF and AP classes
SECRYPT2012-InternationalConferenceonSecurityandCryptography
404