Optimal Communication Complexity of Generic Multicast Key Distribution Saurabh Panjwani UC San Diego (Joint Work with Daniele Micciancio)

Slides:



Advertisements
Similar presentations
TCC 2006 Research on Password-Authenticated Group Key Exchange Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee (CIST, Korea Univ.) Kouchi Sakurai (Kyushu.
Advertisements

Universally Composable Symbolic Analysis of Cryptographic Protocols
A Survey of Key Management for Secure Group Communications Celia Li.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5 Group Key Management.
1 Vipul Goyal Abhishek Jain Rafail Ostrovsky Silas Richelson Ivan Visconti Microsoft Research India MIT and BU UCLA University of Salerno, Italy Constant.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Lecture 6. Bandwidth allocation in multirate multicast is significantly more complicated than the unicast network. There can be several bandwidth allocation.
Soundness And Completeness of Formal Logics of Symmetric Encryption ** Andre Scedrov ** University of Pennsylvania **Gergei Bana ** University of Pennsylvania.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Towards Scalable and Reliable Secure Multicast Presenter: Yang Richard Yang Network Research Lab Department of Computer Sciences The University of Texas.
Computational and Information- Theoretic Soundness and Completeness of the Expanded Logics of Formal Encryption ** Andre Scedrov ** University of Pennsylvania.
Secure Multimedia Multicast: Interface and Multimedia Transmission GROUP 2: Melissa Barker Norman Lo Michael Mullinix server router client router client.
Secure Group Communications Using Key Graphs Chung Kei Wong, Member, IEEE, Mohamed Gouda Simon S. Lam, Fellow, IEEE Evgenia Gorelik Yuksel Ucar.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
1 © IBM, A Reactively Secure Dolev-Yao-style Cryptographic Library DIMACS, June 2004 Michael Backes, Birgit Pfitzmann, Michael Waidner IBM Research,
Scalable Secure Bidirectional Group Communication Yitao Duan and John Canny Berkeley Institute of Design Computer Science.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
Message Equivalence and Imperfect Cryptography in a Formal Model Angelo Troina 1, Alessandro Aldini 2 and Roberto Gorrieri 3 1 Dipartimento di Informatica,
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Group Key Distribution Chih-Hao Huang
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
Universally Composable Symbolic Analysis of Security Protocols Jonathan Herzog (Joint work with Ran Canetti) 7 June 2004 The author's affiliation with.
Multicast Security Issues and Solutions. Outline Explain multicast and its applications Show why security is needed Discuss current security implementations.
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao Nelly Fazio Brown University New.
Computer Science 1 CSC 774 Advanced Network Security Secure Group Communications Using Key Graphs Presented by: Siddharth Bhai 9 th Nov 2005.
Multicast Security Cryptographic Protocols InKwan Yu.
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Secure Group Communication: Key Management by Robert Chirwa.
Dong Hoon Lee CIST Korea University Efficient Communication-Storage Tradeoffs for Broadcast Encryption Schemes ( will be published.
Korea University CRYPTO ‘05 Jung Yeon Hwang, Dong Hoon Lee, Jong In Lim Generic Transformation for Scalable Broadcast Encryption Schemes.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
The design of a tutorial to illustrate the Kerberos protocol Lindy Carter Supervisors : Prof Wentworth John Ebden.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
1 Reasoning about Concrete Security in Protocol Proofs A. Datta, J.Y. Halpern, J.C. Mitchell, R. Pucella, A. Roy.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Intrusion Tolerant Software Architectures Bruno Dutertre and Hassen Saïdi System Design Laboratory, SRI International OASIS PI Meeting.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Multicast Security: A Taxonomy and Some Efficient Constructions By Cannetti et al, appeared in INFOCOMM 99. Presenter: Ankur Gupta.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
The School of Electrical Engineering and Computer Science (EECS) CS/ECE 419/478 Applied Cryptography ADVANCED KEY ESTABLISHMENT AND GROUP KEY MANAGEMENT.
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Group Key Distribution Xiuzhen Cheng The George Washington University.
Efficient and Secure Source Authentication for Multicast 報告者 : 李宗穎 Proceedings of the Internet Society Network and Distributed System Security Symposium.
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Security for Broadcast Network
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
Key Management Network Systems Security Mort Anvari.
Security Kim Soo Jin. 2 Contents Background Introduction Secure multicast using clustering Spatial Clustering Simulation Experiment Conclusions.
1 Security for Broadcast Network Most slides are from the lecture notes of prof. Adrian Perrig.
Design and Implementation of Secure Layer over UPnP Networks Speaker: Chai-Wei Hsu Advisor: Dr. Chin-Laung Lei.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
NSF Faculty Career Award
Efficient State Update for Key Management
Combinatorial Optimization of Multicast Key Management
A Lower Bound on the Communication Cost of Secure Group Key Management
Presentation transcript:

Optimal Communication Complexity of Generic Multicast Key Distribution Saurabh Panjwani UC San Diego (Joint Work with Daniele Micciancio)

Multicast Multicast is a primitive which enables a source of information to communicate with multiple receivers in a network with efficiency better than sending data individually to all the receivers. (Efficiency means better utilization of sender resources and bandwidth.) = Sender = Receiver Three unicast flows = Others

Multicast Multicast is a primitive which enables a source of information to communicate with multiple receivers in a network with efficiency better than sending data individually to all the receivers. (Efficiency means better utilization of sender resources and bandwidth.) = Sender = Receiver One multicast flow = Others

Multicast Example Applications:  Electronic Conferences, Virtual rooms  PayTV or Video-on-demand services  Stock quotes Security in multicast involves new challenges:  How does one keep group communication secret ?  How do multiple receivers authenticate a single sender efficiently ?  How do we authorize anyone to send data on a multicast channel ?

Secrecy in Multicast In unicast, secrecy can be achieved by sharing a key between the parties and using symmetric-key encryption. k E k (data) A ? data

Secrecy in Multicast Can we do the same for multicast ? If group membership changes, the key should also change. A ? data k E k (data)

Multicast Key Distribution A group center distributes a shared ‘group key’ to all members (senders & receivers). Sends messages to change the key whenever membership changes : = Group member = Non-member Center Rekey messages ? ? ? kkk Goal: At any instant of time, only the members should “know” the group key. k'

Multicast Key Distribution Setup: Each user u i has a unique key k i that it shares with the center. u1u1 Center u2u2 u5u5 u4u4 u3u3 u6u6 u2u2 ? ? ? kkk E (k); E (k); E (k) k1k1 k3k3 k5k5 = Group member = Non-member For group with n members, center sends n rekey messages ( per membership update ). Generate k But we can do better… k1k1 k2k2 k3k3 k4k4 k5k5 k6k6

Previous Work – Upper Bounds Wong, Gouda, Lam [WGL98]; Wallner, Harder, Agee [WHA99] gave a protocol in which every join/leave operation in a group of size n involves sending 2log 2 (n) rekey messages. Canetti, Garay, Itkis, Micciancio, Naor, Pinkas [CGIMNP99] improved this to log 2 (n). (Used pseudorandom generators in creation of rekey messages). Best known upper bound – log 2 (n)

Previous Work – Lower Bounds Canetti, Malkin, Nissim [CMN99] gave the first non-trivial lower bound: for a restricted class of protocols, in a group of size n, center must send  (log(n)) rekey messages (per membership update). Snoeyink, Suri and Varghese [SSV01] proved a bound for more general protocols. For groups of size n, rekey cost must be at least  log 3 (n). Best known lower bound – 3log 3 (n) Interestingly, 3log 3 (n) > log 2 (n) (lower bound is higher than upper bound)

Why is this so? In the model used in [SSV01], every rekey message must be of the form E k (k'). Center k Eg: Take G(k) = G 0 (k) G 1 (k)…G m (k) G 0 (k) G m (k) k.. G 0 (k) G m (k) k.. G 0 (k) G m (k) k.. Why can’t pseudorandom generators be used? Best known protocol uses PRGs.

Why is this so? In the model used in [SSV01], every rekey message must be of the form E k (k'). Eg: Two auxiliary keys, k, k'. Center wants to send a key k'' to members u 1 and u 2 Why can’t nested encryption be used? u1u1 Center u2u2 u4u4 u3u3 k k k' k' ? k'' ? E (k''); k1k1 E (k'') k2k2 One Possibility k1k1 k2k2 k4k4 k3k3

Why is this so? In the model used in [SSV01], every rekey message must be of the form E k (k'). Eg: Two auxiliary keys, k, k'. Center wants to send a key k'' to members u 1 and u 2 Why can’t nested encryption be used? u1u1 Center u2u2 u4u4 u3u3 E k (E k' (k'')) Nested encryption has been used in some protocols. k k k' k' ? k'' ? Saves communication by a factor of 2 Better possibility k1k1 k2k2 k4k4 k3k3

A More General Model u1u1 Center u3u3 u6u6 u5u5 k1k1 k3k3 k2k2 Rekey messages can be generated by arbitrary combination of pseudorandom generators and symmetric-key encryption. u2u2 E E (k'', G 1 (k')) G 0 (k 2 )G 1 (k 1 ) u4u4 k4k4 k5k5 k6k6 Question : How good can you do under this model? We answer : log 2 (n) is optimal

Our Model u1u1 Center u3u3 u6u6 u5u5 Every user shares unique key with center. At any instant, a finite set of users are members. All parties have black-box access to a pseudorandom generator G and an encryption- decryption pair (E,D). u2u2 u4u4 k1k1 k2k2 k3k3 k4k4 k5k5 k6k6

Our Model u1u1 Center u3u3 u6u6 u5u5 Membership is controlled by an adversary who issues one of three commands at every instant: u2u2 u4u4 k1k1 k2k2 k3k3 k4k4 k5k5 k6k6  Leave – Delete a member from the group. Leave  Join – Add a non-member to the group. Join  Replace – Replace a member with a non-member (keeps the group size same). Replace A

Our Model u1u1 Center u3u3 u6u6 u5u5 Center responds by sending rekey messages. A rekey message is derived from the grammar: u2u2 E E (k'') G 0 (k 2 )G 1 (k 1 ) u4u4 k1k1 k2k2 k3k3 k4k4 k5k5 k6k6 M K | E K (M) K random_key | G 0 (K) | G 1 (K) |.. | G m (K)

Our Model – Security Definition Center u3u3 u5u5 What are the keys a user “knows” at any instant? u2u2 u4u4 k2k2 k3k3 k4k4 k5k5 k; G 0 (k') k; k' G 0 (k') k; G 1 (k') E E (k g ) kG 0 (k' ) + kgkg E E (k g ) kG 0 (k' ) + ? E E (k g ) kG 0 (k' ) + ? E E (k g ) kG 0 (k' ) + kgkg u1u1 k1k1 E E (k g ) kG 0 (k' ) E (k g ); k1k1 E (k g ) k1k1 + kgkg

Our Model – Security Definition u1u1 Center u3u3 u5u5 What are the keys a user “knows” at any instant? u2u2 u4u4 k1k1 k2k2 k3k3 k4k4 k5k5 E E (k g ) kG 0 (k' ) E (k g ); k1k1 Use an abstract encryption model for defining this notion (Similar to Dolev-Yao logic). Connections between such an abstract framework and complexity-theoretic framework has been studied by Abadi-Rogaway [AR02], Micciancio-Warinschi [MW04], Abadi-Jurjens [AJ01], Gligor-Horvitz [GH03] etc.

Our Model – Security Definition Definition : A multicast key distribution protocol is secure if for every sequence of adversarial commands, at every time instant t, there is a key k t such that - Every member at time t knows k t NO non-member at time t knows k t A very liberal definition ! Security against collusions of non-members? But a weak definition only makes our lower bound stronger.

Our Result Theorem: The amortized communication complexity of secure multicast key distribution is log 2 (n) - c. ( c tends to 0 as number of adversarial commands increases). Matches the cost of the best known protocol up to small ‘additive’ constant. Amortized complexity means number of rekey messages sent per update command for a sequence of update commands.

Proof Idea View a multicast key distribution protocol as a game played between center and adversary. A Center Some of the root keys are labeled either member or non-member. member non-member member The playing board is an infinite forest on keys. A tree in this forest represents the set of pseudorandom keys derived from the root key.

Proof Idea View a multicast key distribution protocol as a game played between center and adversary. A Center member non-member member Adversary changes labels on the keys which are labeled member or non-member. Center introduces rekey messages, modeled as hyper-edges over the keys. k1k1 k k' E k (E k' (k 1 )

Proof Idea View a multicast key distribution protocol as a game played between center and adversary. A Center member non-member member A hyper-edge becomes useless once the key it points to becomes “reachable” from any non-member node. Show that the adversary can select to delete and add members in a way such that a lot of hyper-edges become useless in every move.

Open Questions Does the bound hold even without replace operations ? What about average-case communication complexity ? What if other cryptographic primitives are used for generating rekey messages (eg. PRFs, secret sharing) ?

Questions?

References [AR] M. Abadi, P. Rogaway. Reconciling Two Views of Cryptography (or the Computational Soundness of Formal Encryption). Journal of Cryptology 15(2), [CGIMNP] R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas. Multicast Security: A taxonomy and some efficient constructions. In Proc. of INFOCOM [CMN] R. Canetti, T. Malkin, K. Nissim. Efficient communication-storage tradeoffs for multicast encryption. In Advances in Cryptology – EUROCRYPT [MW] D. Micciancio, B. Warinschi. Completeness theorems for the Abadi-Rogaway Logic of Encrypted Expressions. Journal of Computer Security, 12(1), [AJ] M.Abadi, J.Jurjens. Formal eavesdropping and its computational interpretation. In TACS 2001.

[SSV] J. Snoeyink, S. Suri, G. Varghese. A lower bound for Multicast Key Distribution. In Proc. of INFOCOM [GH] V.Gligor, D.O.Horvitz. Weak Key Authenticity and the Computational Completeness of Formal Encryption. In CRYPTO [WHA] D. Wallner, E. Harder, R. Agee. Key management for Multicast: Issues and Architecture. RFC 2627, June [WGL] C. Wong, M. Gouda, S. Lam. Secure Group Communication using Key graphs. In Proc. of SIGCOMM References