Some are not thieves! Alexandr Andoni (MIT) (work done while at PARC) Jessica Staddon (PARC)

Slides:



Advertisements
Similar presentations
Explicit Exclusive Set Systems with Applications to Broadcast Encryption David Woodruff Joint with Craig Gentry and Zulfikar Ramzan To appear in FOCS 2006.
Advertisements

Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec.
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Private Inference Control David Woodruff MIT Joint work with Jessica Staddon (PARC)
Ulams Game and Universal Communications Using Feedback Ofer Shayevitz June 2006.
Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Self-Healing in Wireless Networks. The self-healing property is expected in many aspects in wireless networks: – Encryption algorithms – Key distribution.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Probability Distributions CSLU 2850.Lo1 Spring 2008 Cameron McInally Fordham University May contain work from the Creative Commons.
Broadcast Encryption – an overview Niv Gilboa – BGU 1.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
1 Vipul Goyal Abhishek Jain Rafail Ostrovsky Silas Richelson Ivan Visconti Microsoft Research India MIT and BU UCLA University of Salerno, Italy Constant.
Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000.
Broadcast Encryption and Traitor Tracing Jin Kim.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy Miodrag Mihaljevic ASIACRYPT 2003 December 1,
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Tirgul 10 Rehearsal about Universal Hashing Solving two problems from theoretical exercises: –T2 q. 1 –T3 q. 2.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
Certificateless encryption and its infrastructures Dr. Alexander W. Dent Information Security Group Royal Holloway, University of London.
Introduction to Modern Cryptography, Lecture ?, 2005 Broadcast Encryption, Traitor Tracing, Watermarking.
19: Protection1 PROTECTION Protection is the mechanism for controlling access to computer resources. Security concerns the physical integrity of the system.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
DANSS Colloquium By Prof. Danny Dolev Presented by Rica Gonen
Key Distribution CS 470 Introduction to Applied Cryptography
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
How to play ANY mental game
Solving Systems of Equations. Rule of Thumb: More equations than unknowns  system is unlikely to have a solution. Same number of equations as unknowns.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
CS548 Advanced Information Security Presented by Gowun Jeong Mar. 9, 2010.
1 Lect. 13 : Public Key Encryption RSA ElGamal. 2 Shamir Rivest Adleman RSA Public Key Systems  RSA is the first public key cryptosystem  Proposed in.
Foundations of Cryptography Lecture 6 Lecturer: Moni Naor.
Feb 17, 2003Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
Africacrypt 2008 Security of Challenge and Response Yu Sasaki 1, Lei Wang 2, Kazuo Ohta 2, Noboru Kunihiro 2 Impossible Differential Attack on Hash Functions.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase Ronald Cramer, Ivan Damgard, Serge Fehr.
Introduction to Quantum Key Distribution
Alternative Wide Block Encryption For Discussion Only.
Example: Bioassay experiment Problem statement –Observations: At each level of dose, 5 animals are tested, and number of death are observed.
Graceful Service Degradation (Or, How To Know Your Payment Is Late) Alexandr Andoni (MIT) Jessica Staddon (PARC)
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Computer Science Revocation and Tracing Schemes for Stateless Receivers Dalit Naor, Moni Naor, Jeff Lotspiech Presented by Attila Altay Yavuz CSC 774 In-Class.
Block Cipher- introduction
Business Statistics: A Decision-Making Approach, 6e © 2005 Prentice-Hall, Inc. Chap 7-1 Business Statistics: A Decision-Making Approach 6 th Edition Chapter.
A Mechanism for Communication- Efficient Broadcast Encryption over Wireless Ad Hoc Networks Johns Hopkins University Department of Computer Science Reza.
COOKIES AND SESSIONS.
The inference and accuracy We learned how to estimate the probability that the percentage of some subjects in the sample would be in a given interval by.
Pseudorandomness: New Results and Applications Emanuele Viola IAS April 2007.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Solving Systems of Equations. Rule of Thumb: More equations than unknowns  system is unlikely to have a solution. Same number of equations as unknowns.
Implicit Volatility Stefano Grazioli.
Implicit Volatility Stefano Grazioli.
S2 Chapter 6: Populations and Samples
NP-Completeness Yin Tat Lee
Broadcast Encryption Amos Fiat & Moni Naor Advances in Cryptography - CRYPTO ’93 Proceeding, LNCS, Vol. 773, 1994, pp Multimedia Security.
Topic 25: Discrete LOG, DDH + Attacks on Plain RSA
The Curve Merger (Dvir & Widgerson, 2008)
البندري الحربي سمية الهزاع نجلاء الرشيدي هبة الهليس منال بن عامر
Confidence Intervals: The Basics
Cryptography Lecture 10.
Cryptography Lecture 24.
Presentation transcript:

Some are not thieves! Alexandr Andoni (MIT) (work done while at PARC) Jessica Staddon (PARC)

Model Content distributor Broadcast channel (accessible to all) E.g., Pay-TV, Online service Content encrypted to limit access Users Privileged – ones that can decrypt the content Revoked – whose privileges where revoked due to non- payment, expiration, etc  Key management protocol (revocation protocol) More on this later

Problem 0/1 ( /  ) user hierarchy is too rigid Ineffective, disruptive when the revocation happened unexpectedly, in error, etc Imagine unfortunate scenario User is late on the monthly payment => is revoked by the distributor => misses favorite TV show => has to ask for reinstatement: high logistical cost Want: Graceful revocation Cues on pending revocation: inherent to the content

Basic Solution Service degradation Degrade quality of service (e.g., content is delayed or partial) Affects users that are “a little late” on payment Cue of pending revocation: degradation itself What means “degradation”? Our definition: Degraded = it takes more effort to decrypt the content; but all content is decrypted in the end Other possible definitions (not considered here): Video is choppy [Abdalla-Shavitt-Wool’03]

How? Enforce user classes via key management protocols (a.k.a. revocation protocols) Revocation protocol = can target any set P of users Degradation protocol is a specialization of the revocation protocol, but hope to improve parameters Effort to decrypt: via variably hard functions Computing the function incurs computational effort The amount of computational effort is parametrizable Related to “pricing functions” [Dwork-Naor’92], “proofs of work” [Jakobsson-Juels’03] (in the context of spam-fighting)

Variably Hard Functions Inspired from the idea of “proofs of work” proposed mostly for fighting spam: For an m, have to attach F(m) such that: “Moderately hard” to compute F(m) (e.g., 10secs) Easy/fast to check that is valid We need: Parametrizable “moderately hard” function F A degraded user gets “m” and a hardness parameter p For fixed m, F(m) must be the same for all p

Definition: Variably Hard Functions F is variably hard if: There is some test function g(x) (think g(x)=m) For each x, there is a collection of hints Hints(x) A hint is a set Y (p) (x) of size 2 p s.t. x  Y (p) (x) It takes ≥O(2 p ) time to compute F(x) given only g(x) and some Y (p) (x) (x is not given) “Hardness” in not knowing x Can compute F(x) in 2 p given g(x), Y (p) (x): Just try all possible x  Y (p) (x) and test with g(x)

Construction via OW Permutation Let P be a one-way permutation Define test function g(x)=P(x) Define F(x)=x Computing F(x) knowing g(x) is equivalent to inverting P A hint Y (p) (x) is the set of y’s that have same first k-p bits as x Y (p )(x)= p bits 01001…*****... x= k bits 01001…

Using Variably Hard Functions Encrypt the content with a session key SK=F(x) Broadcast g(x) Distribute hints of x using revocation protocol Privileged users P: receive complete hint => easy to compute SK Degraded users D: receive partial hint => moderate to compute Revoked users R: receive no hint => impossible to compute Inefficient: Have to be able to target only P More direct approach? x= To privileged To degraded

Revocation Protocols Non-trivial: If all users have the same key, how do we “take back” the key from a revoked user? Studied since ’90s: Stateful – users have “state”; but might be fatal if they miss a part of the broadcast Stateless Most common (stateless) are based on e.g., Shamir-like secret sharing

Improve Revocation Illustration for revocation based on secret sharing Revocation protocol of [Kumar-Rajagopalan- Sahai’99] in two steps: 1 st step: uses cover free families Let U be a universe of keys Users get distinct subsets S u  U (all S u form cover-free family) A message SK is broadcasted as:  E k1 [SK], E k2 [SK]… E ks [SK], for some T={k1…ks}  U If S u  T≠ , then the user can decrypt SK Design sets S u such that:  for any S u (privileged user), and S 1,S 2,…S r (revoked)  |S u \S 1 \S 2 \...S r |≥a|S u |, where a is a constant

Revocation via Secret Sharing (2) 2 nd step: reduce communication blow-up For revoked S 1,S 2,…S r, encrypt with all T=U\S 1 \S 2 \...S r Parameters so far:  User storage: |S u |=O(r log n) keys  Communication blow-up: |U|=O(r 2 log n) Can improve: a privileged user gets a|S u | copies of SK Use a secret sharing scheme! Create U shares of SK such that any a|S u | shares are enough to reconstruct SK Obtain parameters [KRS99, randomized]: User storage: O(r*log n) Communication blowup: O(r)

Secret Sharing for Degradation [KRS’99] establishes: A privileged user gets a|S u |=O(r log n) shares of SK A revoked user gets 0 shares Design such that a degraded user gets, e.g., (1-c)*a|S u | shares (0<c<1): These shares constitute a hint Y (p) (x), p=ca|S u | A degraded user recovers SK in 2 ca|Su| steps Indeed can modify the [KRS’99] cover-free family: If key k  U belongs to D but not R, choose k to be in T with some probability p≈1-c

Deficiencies Can obtain some slightly better bounds, but messy Many parameters (max # revoked, max # degraded) Have to know the parameters in advance (same for KRS’99) Not collusion resistant against degraded users Several degraded users may get all the necessary shares Not a big problem Degradation mainly serves as a cue Act of colluding is sufficient to serve as a cue

Towards (more) practical protocols Observations: Not necessary to redistribute hints for each new session if user classes don’t change Want finer division into classes: Privileged class P Degraded classes D 1, D 2,… D L (progressively worse service quality) Revoked class R Known degradation schedule: sometimes we know when somebody will probably be degraded

Practical Degradation Protocols Will present two: Known degradation schedule: trial period scenario Unknown degradation schedule: general scenario

Trial Period Scenario: Model Trial period scenario In the period [30,40] days, the service is progressively worse 1 degraded class per day: D 1,D 2,…D 10 Each D i has its “hardness” parameter time t=0 subscription t=30 t=40 normal servicedegradedrevoked

Trial Period Scenario: Construction Broadcast on day t: E Kt [SK], E F(x) [SK], g(x) K i is a series such that K i =W(K i+1 ); W is one-way A i is defined the same way A user gets K 29 and A 29 On day t<30, the user can decrypt SK with K t On day t≥30, the user can compute F(x): from g(x) and an incomplete hint based on A t-10 …A 29 At t=30, x= At t=31, x= ← A 19 ←A 20 ←A 21 ←… ←A 29 ←A 30 ←A 31 ←… ?… …?? Legend: ← means application of a one-way function/permutation

General Scenario Can generalize the previous protocol Same idea of using A t series to create many degradation classes But need more attentive distribution of A t and K t : using revocation protocols this time Can be based on any revocation protocol Expensive communication only when classes change (somebody is degraded/revoked)

Final Remarks Computational effort may vary on different machines: Then, use in fact the “memory-bound” functions of [Dwork-Goldberg-Naor’03] Can guarantee O(2 p ) memory accesses More uniform across platforms We adapted “memory-bound” functions to be variably hard

Conclusions Introduced the notion of service degradation Degraded users: between privileged and revoked Have degraded quality Serves as a cue to impending revocation Construction based on: Variably hard functions Revocation protocols

Interesting Questions How much can degradation buy us in terms of user storage and communication? Is this the right approach to degradation? Are there other (better) ones?

Thank you!