Shahzad Basiri Imam Hossein university Workshop on key distribution Tuesday, May 24, 2011 Linear Key Predistribution Scheme.

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz.
Vector Spaces A set V is called a vector space over a set K denoted V(K) if is an Abelian group, is a field, and For every element vV and K there exists.
8.3 Inverse Linear Transformations
On Complexity, Sampling, and -Nets and -Samples. Range Spaces A range space is a pair, where is a ground set, it’s elements called points and is a family.
Lower bounds for small depth arithmetic circuits Chandan Saha Joint work with Neeraj Kayal (MSRI) Nutan Limaye (IITB) Srikanth Srinivasan (IITB)
Finite Fields Rong-Jaye Chen. p2. Finite fields 1. Irreducible polynomial f(x)  K[x], f(x) has no proper divisors in K[x] Eg. f(x)=1+x+x 2 is irreducible.
BCH Codes Hsin-Lung Wu NTPU.
An Ω(n 1/3 ) Lower Bound for Bilinear Group Based Private Information Retrieval Alexander Razborov Sergey Yekhanin.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
1 390-Elliptic Curves and Elliptic Curve Cryptography Michael Karls.
Discrete Gaussian Leftover Hash Lemma Shweta Agrawal IIT Delhi With Craig Gentry, Shai Halevi, Amit Sahai.
Foundations of Cryptography Lecture 4 Lecturer: Moni Naor.
Signal , Weight Vector Spaces and Linear Transformations
Signal , Weight Vector Spaces and Linear Transformations
An Efficient Construction of Secret Sharing for Generalized Adversary Structure and Its Reduction Communications, Circuits and Systems, ICCCAS 2004.
1. 2 Gap-QS[O(n), ,2|  | -1 ] 3SAT QS Error correcting codesSolvability PCP Proof Map In previous lectures: Introducing new variables Clauses to polynomials.
Basis of a Vector Space (11/2/05)
1 Introduction to Kernels Max Welling October (chapters 1,2,3,4)
Dimension of a Vector Space (11/9/05) Theorem. If the vector space V has a basis consisting of n vectors, then any set of more than n vectors in V must.
Secret Sharing Algorithms
Chapter Two: Vector Spaces I.Definition of Vector Space II.Linear Independence III.Basis and Dimension Topic: Fields Topic: Crystals Topic: Voting Paradoxes.
Coordinate Systems (11/4/05) It turns out that every vector space V which has a finite basis can be “realized” as one of the spaces R n as soon as we pick.
Certificateless Threshold Ring Signature Source: Information Sciences 179(2009) Author: Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang Presenter:
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
1 NTRU: A Ring-Based Public Key Cryptosystem Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman LNCS 1423, 1998.
Section Section Summary Introduction to Boolean Algebra Boolean Expressions and Boolean Functions Identities of Boolean Algebra Duality The Abstract.
Polynomial Factorization Olga Sergeeva Ferien-Akademie 2004, September 19 – October 1.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
CS548 Advanced Information Security Presented by Gowun Jeong Mar. 9, 2010.
Fingerprinting & Broadcast Encryption for Content Protection.
DBSQL 3-1 Copyright © Genetic Computer School 2009 Chapter 3 Relational Database Model.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Source: KSII Transactions On Internet And Information Systems Vol. 3, No. 2, April 2009 Authors: Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee.
Efficient Key Predistribution for Grid – Based Wireless Sensor Networks.
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Learning bounded unions of Noetherian closed set systems via characteristic sets Yuichi Kameda 1, Hiroo Tokunaga 1 and Akihiro Yamamoto 2 1 Tokyo Metropolitan.
Attacking Cryptographic Schemes Based on ‘Perturbation Polynomials’ Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz.
Approximation Algorithms Department of Mathematics and Computer Science Drexel University.
Chapter 3 DeGroot & Schervish. Functions of a Random Variable the distribution of some function of X suppose X is the rate at which customers are served.
Author: Hangyang Dai and Hongbing Xu
Mathematical Writing chapter 7 Roozbeh Izadian Fall 2015.
4.1 Introduction to Linear Spaces (a.k.a. Vector Spaces)
Bayesian Density Regression Author: David B. Dunson and Natesh Pillai Presenter: Ya Xue April 28, 2006.
Maximizing Symmetric Submodular Functions Moran Feldman EPFL.
is a linear combination of and depends upon and is called a DEPENDENT set.
Multi-linear Systems and Invariant Theory
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
A decomposition method for CNF minimality proofs Ondrej Cepek Charles University in Prague, Czech Republic jointly with Endre Boros, Petr Kucera, (Petr.
13.1 Sequences. Definition of a Sequence 2, 5, 8, 11, 14, …, 3n-1, … A sequence is a list. A sequence is a function whose domain is the set of natural.
The main study of Field Theory By: Valerie Toothman
Secret Sharing Schemes: A Short Survey Secret Sharing 2.
From DeGroot & Schervish. Example Occupied Telephone Lines Suppose that a certain business office has five telephone lines and that any number of these.
Zurich University, 11 April  A secret sharing scheme is a method of dividing a secret S among a finite set of participants.  only certain pre-specified.
Lecture 7 Vector Space Last Time - Properties of Determinants
On the Size of Pairing-based Non-interactive Arguments
Advanced Protocols.
Section 4.1: Vector Spaces and Subspaces
Section 4.1: Vector Spaces and Subspaces
Some Rules for Expectation
Fuzzy Identity Based Encryption
More about Normal Distributions
Linear Algebra Chapter 4 Vector Spaces.
Linear Algebra Lecture 3.
The principle of inclusion and exclusion; inversion formulae
Functions of Random variables
PCP Characterization of NP:
RAYAT SHIKSHAN SANSTHA’S S.M.JOSHI COLLEGE, HADAPSAR, PUNE
MA5242 Wavelets Lecture 1 Numbers and Vector Spaces
Presentation transcript:

Shahzad Basiri Imam Hossein university Workshop on key distribution Tuesday, May 24, 2011 Linear Key Predistribution Scheme

Outline KKey Predistribution Schemes LLinear Key Predistribution Schemes PPrevious Metods in KPS CConstructing Linear Key Predistribution Schemes DDulity in Linear Key Predistribution Schemes CConstructing Linear Key Predistribution Schemes by Duality

KKey Distribution Scheme A key predistribution scheme (KPS) is a method by which A trusted authority TA distributes secret information among a set of users in such a way that every user in a group in some specified family of privileged subsets is able to compute a common key associated with that group. Besides, certain coalitions of users ( forbidden subsets) outside a privileged group must not be able to find out any information on the value of the key associated with that group.

Previous Scheme  Polynomial Blom Blundo  Based on Key Distribution Patterns Mitchell and Piper Trivial Scheme

Goals  One of the goals of this scheme is the construction of key predistribution schemes with good information rate for other families of specification structures.  A new general model for the design of key predistribution schemes, which is based mainly on linear algebraic techniques, the linear key predistribution schemes (LKPSs).  This new model, based on linear algebraic techniques, unifies all previous proposals.

Assumption  A subset P ⊂ U is a privileged subset of the specification structure if there exists F ⊂ U such that (P, F) ∈.  The family of the privileged subsets of is denoted by P ( ).  For any P ∈ P ( ), let us consider F P = { F ⊂ U : (P, F) ∈ }. The elements of F P are called the P- forbidden subsets of.

Assumption  For any P ∈ P ( ), the family of P -forbidden subsets F P is monotone decreasing, that is, if F 1 ∈ F P and F 2 ⊂ F 1, then F 2 ∈ F P.  For any F ⊂ U, we consider the family P F of F - privileged subsets of, which consists of all subsets P ⊂ U such that (P, F) ∈.

Assumption  Let be a specification structure on a set of users U such that both F P and P F are monotone decreasing for any (P, F) ∈.  The specification structure = {(P, F) ∈ : (F, P) ∈ } is called the dual specification structure of.

Outline KKey Predistribution Schemes LLinear Key Predistribution Schemes DDefinition PPrevious methods in KPS CConstructing Linear Key Predistribution Schemes DDulity in Linear Key Predistribution Schemes CConstructing Linear Key Predistribution Schemes by Duality

Proof Randomly chooses TA1 2 3 N

Outline KKey Predistribution Schemes LLinear Key Predistribution Schemes DDefinition PPrevious methods in KPS CConstructing Linear Key Predistribution Schemes DDulity in Linear Key Predistribution Schemes CConstructing Linear Key Predistribution Schemes by Duality

Previous Scheme  Polynomial Blom Blundo  Based on Key Distribution Patterns Mitchell and Piper Trivial Scheme

Construct a KPS from KDP TA B2B2 BlBl BmBm B1B1 Randomly chooses

Construct a KPS from KDP P

Proof Proof

Blundo et al scheme Blundo et al scheme TA 2 i N 1 Randomly Choose f (x 1, x 2,..., x r ) u i = f ( s i, x 2,..., x r ) Choose distinc public s 1, s 2,..., s l

Blundo et al scheme

Blundo et al scheme LKPS  Let E r be the vector space of symmetric polynomials on r variables, with coefficients in F q and degree at most t on each variable

Outline KKey Predistribution Schemes LLinear Key Predistribution Schemes PPrevious Metods in KPS CConstructing Linear Key Predistribution Schemes DDulity in Linear Key Predistribution Schemes CConstructing Linear Key Predistribution Schemes by Duality

Multilinear function  Let V be a vector space over a finite field F q. will denote the vector space V × V × ・・ ・ × V, where there are r factors in this product.  A mapping T : F q is called a multilinear function if, for any i = 1, 2,..., r, T ( v 1,..., v i + v ’i,..., v r ) = T ( v 1,..., v i,..., v r )+T ( v 1,..., v ’i,..., v r ) and T ( v 1,..., λ v i,..., v r ) = λ T ( v 1,..., v i,..., v r ).

Notations  Notation 1: The vector space r -linear functions over F q  Notation 2: The vector space r –linear symmetric functions over F q

Outline KKey Predistribution Schemes LLinear Key Predistribution Schemes PPrevious Metods in KPS CConstructing Linear Key Predistribution Schemes DDulity in Linear Key Predistribution Schemes CConstructing Linear Key Predistribution Schemes by Duality

Duality in LKPSs Under certain conditions, any -LKPS provides a LKPS for the dual specification structure and we relate the information rates of the two schemes.

Proof (P, F) ∈ There exists a -LKPS with information rate (F, P) ∈

∈ U∈ U