Top Banner
On The Algebraic On The Algebraic Structure of Structure of Combinatorial Broadcast Combinatorial Broadcast Encryption Schemes Encryption Schemes and Applications and Applications Serdar Pehlivanoglu (pay-live-a-no-glue) Joint work with Aggelos Kiayias [email protected]
45

On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Jan 31, 2016

Download

Documents

kiley

On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications. Serdar Pehlivanoglu (pay-live-a-no-glue) Joint work with Aggelos Kiayias [email protected]. Digital Content Distribution. What is digital content distribution? It is multi-recipient transmission - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

On The Algebraic Structure of On The Algebraic Structure of Combinatorial Broadcast Combinatorial Broadcast

Encryption SchemesEncryption Schemesand Applicationsand Applications

Serdar Pehlivanoglu(pay-live-a-no-glue)

Joint work with Aggelos [email protected]

Page 2: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Digital Content Distribution

• What is digital content distribution? – It is multi-recipient transmission

• Access Control

– Multi-recipient encryption

Recipient population

U1, U2, U3, …, Un

Recipient population

U1, U2, U3, …, Un

TransmissionCenter

Insecure Channel

Page 3: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Multi-Recipient Encryption

Licensing Agency

Distributor

Recipient population

U1, U2, U3, …, Un

Recipient population

U1, U2, U3, …, Un

Insecure Channel

Keys

DistributorDistributorDistributorDistributor

Recipient population

U1, U2, U3, …, Un

Recipient population

U1, U2, U3, …, Un

DistributorDistributorDistributorDistributor

Recipient population

U1, U2, U3, …, Un

Recipient population

U1, U2, U3, …, Un

TransmissionCenter

Page 4: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Applications

• Encryption for DVDs and other Media content distribution systems.– Regular DVDs and Blu-Ray disks.

• Filesystem Access Permissions.

• Etc.

September 2008 4

Page 5: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Challenges

• Minimizing – Transmission overhead– Key storage for receivers.– Key derivation time for receivers.

Page 6: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Example: Linear Trace&Revoke Scheme

Licensing Agency

Transmission overhead = nKey storage = 1Key Derivation = 1

Content Distributor

U1 U2 U3Un

Secret Keys1

Es1(k) Es2(k) Es3(k) Esn(k)

Ek(m)

s2 s3 … sn

Page 7: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Subset Cover Framework(SCF)

• Subset Cover Framework [NNL01]– General combinatorial framework. Can describe many

schemes.– Tracing and revoking unlimited number of users.– Seamless integration of tracing and revoking.

• N is the set of all recipients, R is the set of excluded recipients.

• Define a set system = {S1,S2,…,Sw } 2N. • Revocation property: (fully exclusive)

– Any subset S in N can be partitioned into disjoint subsets from .

Page 8: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

• Each subset Si is associated with a long-lived key Li.

• Key Assignment: – Any user u has access to Li through its private information

if and only if u Si

• Revocation algorithm:– Given R find a partition of N\R s.t

N \ R = i=1m Si

with associated keys L1, L2, … Lm

• The ciphertext is:

Encryption in SCF

<in1, …, inm, EL1(K), EL2(K), …ELm(K)> FK(M)

Header Body

Page 9: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

A series of works

9

Subset Cover Scheme

Transmission Computation Key Storage

CS r log (N/r) 1 log N

SD 2r-1 log N log2 N

Basic LSD 4r-1 log N log3/2 N

SSD 4kr N1/k 2klog N

Basic Key Chain Tree

2r N 2log N

Subset Incremental Chain System (SIC)

2kr N1/k 2log N

One-Way Chain r/k N-r Nk

(w-Complete Tree SIC)

2r kN1/k k ((log N)/2 +1)

crypto 2001

crypto 2001

crypto 2002

crypto 2004

Eurocrypt 2005

ISC 2004

Asiacrypt 2005

Financial Crypto 2006

Page 10: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Our Focus

• Study the Algebraic Structure of SCF– Based on the observation : the underlying set

system constitutes a partial order set (Key Poset).

• Generic revocation and tracing algorithms• What are sufficient conditions for optimal revocation

and tracing?• How to design of new schemes tailored to specific

scenarios or improving aspects of existing ones?

A poset is a set P with relation that is reflexive, antisymmetric, and transitive

Page 11: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

The Key Poset

• Given any SCF instance we define the Key-poset• Nodes Subsets Keys Leaves

Users• Edges represents the subset relation.• The Set System:

• Is represented by the nodes in the Hasse diagram of the Key Poset

• Revocation:• Finding the nodes to cover the enabled set

of leaves. • Tracing:

• Finding the nodes to cover the nodes not used by the pirate decoder.

• Key Assignment:• All keys of the nodes above a leaf is known

to (or derived by) that leaf.

In this example : Transmission overhead = 1Key storage = 2n-1

Key Derivation = 1

U1 U2 U3 U4

Page 12: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Subset Difference Method [NNL01]

vi

vj

Si,j

vi

vj

Si,j = Set of all leaves in the subtree of Vi but not in Vj

Page 13: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

The Key Poset of NNL

Page 14: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

A basic Question

• What makes a key poset good ?

• Is it possible to describe “good” in algebraic terms?

• Observe : to revoke we need to efficiently solve some instance of set cover.

Page 15: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Short Primer on Partial Orders

• A nonempty subset I of a poset (P, ) is called an ideal if I is lower and directed.– A nonempty subset A of a poset (P, ) is called a directed

set if for any two elements a, bA, there exists c in A such that a c and b c.

– It is called a lower set if for every xA, y x implies that y is in A.

Page 16: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

An ideal in the SD key poset

Page 17: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Our Objective

• We need to solve a set cover efficiently.

• Basic observation: If the set system is an ideal we can do this efficiently.– IdealCover(u): Starting from u grow up until you

hit the top.• Basic operation: “grow”

Page 18: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Short Primer on Partial Orders

• A nonempty subset I of a poset (P, ) is called an ideal if I is lower and directed.– A nonempty subset A of a poset (P, ) is called a directed

set if for any two elements a, bA, there exists c in A such that a c and b c.

– It is called a lower set if for every xA, y x implies that y is in A.

• An atom in poset P is an element that is minimal among all elements.

• The dual notion of ideal, the one obtained in the reverse partial order, is called a filter. – We call F(x) as an atomic filter if x is an atom.– We denote Px by the complement of F(x) in (P, ).

Page 19: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Filter

Page 20: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

The Complement of a Filter

Page 21: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

The Complement of a Filter

In general :

The complement of a filter is a lower set.(not necessarily an ideal).

Page 22: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Lower Maximal Partitions

• Given a nonempty subset A of a poset (P, ) that is a lower set, we say<M1,M2, . . . ,Mk> is a lower-maximal partition of A if1. Mi is a lower set for i = 1, . . . , k.2. The atoms of Mi and Mj are different provided that i j.

3. Mi is maximal with respect to A, i.e. if aMi and bA s.t a b, then bMi.

4. k is the largest integer such that all the above hold.• The order of a lower set A is defined as the size of

its lower-maximal partition. We denote the order by ord(A).

• Proposition. Any lower set A of poset (P, ) has a unique lower-maximal partition.

Page 23: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

“Separable” Families

• We say a set system is separable if in the lower-maximal partition <M1,M2, . . . ,Mk> of it holds that Mi is an ideal of for i=1,…, k

Page 24: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Set Covering Separable Families

• Given a separable family we can easily solve set cover:– Pick a user and “grow” along a chain till hit top.– Repeat with a user outside the ideals selected.

• [needs “grow” + “select outside subset” as basic operations]

• Complexity : Sum of chains in each ideal,

[poly-logarithmic length]

Page 25: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Factorizable Families

• A fully-exclusive set system is called factorizable if it is an ideal and for any ideal I and any atom u, it holds that IPu is separable.– Hint : Being factorizable implies a good

behavior w.r.t. revocation.

Page 26: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Basic Theorem

• Definition. ’ = Revoke( , R) is the family Pu1 … Pur

where R = {u1,…,ur}

• Theorem. If is factorizable, then it holds that ’ = Revoke( , R) is separable.

Page 27: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Revocation Algorithm

The theorem implies the revocation algorithm Cover(N,R) :

• Given and R– Determine ’ = Revoke( , R) – Set Cover ’

Page 28: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Transmission Overhead

• Given a factorizable set system , Cover(N,R) outputs an optimal solution and the

communication overhead is ord(i=1r Pui) where

R={u1, …, ur}.

• Given a factorizable set system – If for any ideal I and an atom u, it holds that

ord(I Pu) log |I|, then the communication overhead for revoking r users is O(rlogN).

– If, on the other hand, ord(I Pu) c, then the communication overhead for revoking r users is at most r(c -1).

Page 29: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Alternative Characterization• Theorem: A set system is factorizable iff following holds:

S1 S2 is in the collection if S1 S2 (*)

Proof. Suppose that the set system is not factorizable due to an ideal I and an atom u despite (*) holds: Consider the lower maximal partition <M1,M2, . . . ,Mk> of I Pu, suppose that Mi is not ideal, then it has more than one maximal element. Since k=ord(I Pu) is maximal, then these maximal elements are intersecting. Then implies that their union is in the set system and hence also in I Pu

Suppose that set system is factorizable but S= S1 S2 is not in the collection. Consider the minimal ideal I in the set system that contains S (this exists due to factorizable property). There exists an atom u in I that is not in S. Since I Pu is separable, there exists an ideal in its lower maximal partition that contains both S1 and S2 which contradicts the minimality I.

Page 30: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Alternative Characterization

• Theorem: The set systems corresponding to the – Complete Subtree [NNL01], – Subset Difference [NNL01]– Layered Subset Difference [HaSh02], – Stratified Subset Difference[GoSuTa04], – Subset Incremental Chain [AtIm05], – Key-Chain Tree[WNR04], – Complete Key-Chain Tree [HwLeLi05]

• are all factorizable.

Page 31: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Extended Results to the Tracing

• We can extend our results to the Tracing problem.

• Pirate decoder uses some keys, i.e. subsets.• Tracing is equivalent to revoking in a

modified set system that ‘chops’ the subsets that are used by the pirate decoder.– Suppose that S is used by the pirate decoder,

then ’ = \F(S).– The cover is Revoke(’, {}). ’ doesn’t have to be separable.

• Improvement on the communication overhead compared to the only known tracing algorithm.– Linear in number of traitors.

Page 32: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Our Key Derivation Method

• Each user should be able to derive all the keys for subsets in F(u).

• Approach:– Split key poset into a forest T of upward

looking trees.– Keys in each tree of T are derivable from

the root by one-way transformations.– User gets the key of the roots for all trees

in the forest TF(u)

Page 33: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

A new class of Broadcast Encryption Schemes

• Applications

• We demonstrate the power of working directly with the key poset.

Page 34: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

X-Property

• Root has children as many as the number of leaves:– Cu for any uN where Cu = N\{u}

• Two elements S1,S2 so that– F(S1) and F(S2) are disjoint and both are

complete binary trees of height log|N| -1 excluding the root.

– Any Cu is a leaf of one of the binary trees in F(S1) or F(S2)

Page 35: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

A transformation that Preserves the X-property

One-to-one mapping between the below filters to the above trees

Page 36: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Some Facts on Transformation

• Squares the number of users.• Theorem. If the underlying set system is

factorizable then the resulting set system is also factorizable.

• Let be a factorizable set system defined over a set size 2m. If for any ideal I and an atom u, it holds that ord(I Pu) c(m), then

– ord(I` Pu) c(m) + 2 for any I`

Transform() and an atom u in a set of size 22m.

Page 37: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Transmission overhead

• Let ` constructed after k transformations of a set system defined over a set with size d and transmission overhead of c(d)r to disable a set of r users. – If d is a constant, then the transmission

overhead of ` would be O(r log log N)– If k is a constant, then the transmission

overhead of ` would be O(r.c(d)).

Page 38: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Key-Derivation Procedures

• Path Property: – There exist two elements S1,S2 so that

• F(S1) and F(S2) are disjoint and both filters are complete binary trees of height log|N| -1 excluding the root.

• For any u, Pu intersects with the binary trees F(S1) or F(S2) in a single path of length log|N| -1.

• Path-property implies X-property• The transformation preserves the path-

property.

Page 39: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Key Assignment & Derivation for path-property

LABEL = S

GR (S)

GR(GR (S))

GR(GR(GR (S)))

GL(GL (S))

GL (S)

GL(GR (S))GR(GL (S))

Cu

User u is given GL(S), GR(GR (S)), GR(GL(GR(S))) …

will be able to derive any key of the hanging off nodes by at most log N function evaluations.

F(S1) F(S2)

Pu intersects with binary trees in red nodes

Page 40: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Key Storage& Derivation for the Transformation

• Let be a factorizable set system defined over a set size 2m. If the key storage (derivation) for the set system is K(m) (D(m)), then K’(m) (D’(m)) for the new set system Transform() would be– K’(m)= 2K(m) + m.– D’(m)= max(D(m), m)

Page 41: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

A Construction

Start with: which satisfies the path-property.

Applying the transformation two times yield:

Page 42: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Scheme Parameters(1)

• Start with basic set system for 2 users:• Apply the transformation k times to get a set

system for N=22k users.

• Storage 2k = log N• Computation time: log N• Transmission overhead: 2rloglog N

Page 43: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Another Basic Scheme with path-property

Page 44: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Scheme Parameters(2)

• Start with the set system for d users:

Storage: 3(log d -1)

Computation time: max(d, log d)

Transmission overhead: 2r

• Apply the transformation k times to get a set system for N=d2k users, say k is a constant.

Storage: 2k.log N

Computation time: max(N1/2^k, log N)

Transmission overhead: 2rk

• Compare this with k-complete tree and Layered Subset Incremental Chain System

Page 45: On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications

Thank You