Chair for Network- and Data-Security

Slides:



Advertisements
Similar presentations
Trees Chapter 11.
Advertisements

WSPD Applications.
Augmenting Data Structures Advanced Algorithms & Data Structures Lecture Theme 07 – Part I Prof. Dr. Th. Ottmann Summer Semester 2006.
Binary Search Trees CSE 331 Section 2 James Daly.
Broadcast Encryption – an overview Niv Gilboa – BGU 1.
Chapter 6: Transform and Conquer
On The Algebraic Structure of Combinatorial Broadcast Encryption Schemes and Applications Serdar Pehlivanoglu (pay-live-a-no-glue) Joint work with Aggelos.
1 Trace, Revoke and Self Enforcement Mechanisms for Protecting Information Moni Naor Weizmann Institute of Science.
Klee’s Measure Problem Computational Geometry, WS 2007/08 Group Work Prof. Dr. Thomas Ottmann Khaireel A. Mohamed Algorithmen & Datenstrukturen, Institut.
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy Miodrag Mihaljevic ASIACRYPT 2003 December 1,
Parallel Prefix Computation Advanced Algorithms & Data Structures Lecture Theme 14 Prof. Dr. Th. Ottmann Summer Semester 2006.
Chapter 4: Trees General Tree Concepts Binary Trees Lydia Sinapova, Simpson College Mark Allen Weiss: Data Structures and Algorithm Analysis in Java.
More sorting algorithms: Heap sort & Radix sort. Heap Data Structure and Heap Sort (Chapter 7.6)
Chapter 6: Transform and Conquer Trees, Red-Black Trees The Design and Analysis of Algorithms.
What ~1.25 turned out to be or Complex poles and DVDs Ilya Mironov Microsoft Research, SVC October 3 rd, 2003.
Rooted Trees. More definitions parent of d child of c sibling of d ancestor of d descendants of g leaf internal vertex subtree root.
© 2006 Pearson Addison-Wesley. All rights reserved11 A-1 Chapter 11 Trees.
Advanced Topics in Algorithms and Data Structures Page 1 An overview of lecture 3 A simple parallel algorithm for computing parallel prefix. A parallel.
1 Section 9.2 Tree Applications. 2 Binary Search Trees Goal is implementation of an efficient searching algorithm Binary Search Tree: –binary tree in.
Random walks and analysis of algorithms in cryptography Ilya Mironov Stanford University.
Advanced Topics in Algorithms and Data Structures 1 An example.
Advanced Data Structures and Algorithms COSC-600 Lecture presentation-6.
Lecture 06: Tree Structures Topics: Trees in general Binary Search Trees Application: Huffman Coding Other types of Trees.
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao Nelly Fazio Brown University New.
May 5, 2015Applied Discrete Mathematics Week 13: Boolean Algebra 1 Dijkstra’s Algorithm procedure Dijkstra(G: weighted connected simple graph with vertices.
CS548 Advanced Information Security Presented by Gowun Jeong Mar. 9, 2010.
Chapter 19: Binary Trees. Objectives In this chapter, you will: – Learn about binary trees – Explore various binary tree traversal algorithms – Organize.
Secure Group Communication: Key Management by Robert Chirwa.
May 1, 2002Applied Discrete Mathematics Week 13: Graphs and Trees 1News CSEMS Scholarships for CS and Math students (US citizens only) $3,125 per year.
Trees CSC 172 SPRING 2002 LECTURE 14. Lists We have seen lists: public class Node { Object data; Node next; } 
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Broadcast Encryption Amos Fiat & Moni Naor Presented.
Dong Hoon Lee CIST Korea University Efficient Communication-Storage Tradeoffs for Broadcast Encryption Schemes ( will be published.
Korea University CRYPTO ‘05 Jung Yeon Hwang, Dong Hoon Lee, Jong In Lim Generic Transformation for Scalable Broadcast Encryption Schemes.
Binary Trees. Binary Tree Finite (possibly empty) collection of elements A nonempty binary tree has a root element The remaining elements (if any) are.
Binary Search Trees A binary tree:A binary tree: –No node has more than two child nodes (called child subtrees). –Child subtrees must be differentiated,
Binary Trees, Binary Search Trees RIZWAN REHMAN CENTRE FOR COMPUTER STUDIES DIBRUGARH UNIVERSITY.
Broadcast Encryption Scheme Based on Binary Cubes Alexey Urivskiy JSC «InfoTeCS», Moscow, Russia
CSIT 402 Data Structures II
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
2-3 Tree. Slide 2 Outline  Balanced Search Trees 2-3 Trees Trees.
Computer Science: A Structured Programming Approach Using C Trees Trees are used extensively in computer science to represent algebraic formulas;
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Segment Trees Basic data structure in computational geometry. Computational geometry.  Computations with geometric objects.  Points in 1-, 2-, 3-, d-space.
Chapter 4: Trees Part I: General Tree Concepts Mark Allen Weiss: Data Structures and Algorithm Analysis in Java.
Computer Science Revocation and Tracing Schemes for Stateless Receivers Dalit Naor, Moni Naor, Jeff Lotspiech Presented by Attila Altay Yavuz CSC 774 In-Class.
Data Structures AVL Trees.
Rooted Tree a b d ef i j g h c k root parent node (self) child descendent leaf (no children) e, i, k, g, h are leaves internal node (not a leaf) sibling.
CIS 068 Welcome to CIS 068 ! Lesson 12: Data Structures 3 Trees.
1 More Trees Trees, Red-Black Trees, B Trees.
Lecture 9COMPSCI.220.FS.T Lower Bound for Sorting Complexity Each algorithm that sorts by comparing only pairs of elements must use at least 
Binary Search Trees.  Understand tree terminology  Understand and implement tree traversals  Define the binary search tree property  Implement binary.
1Computer Sciences. 2 HEAP SORT TUTORIAL 4 Objective O(n lg n) worst case like merge sort. Sorts in place like insertion sort. A heap can be stored as.
HYPERCUBE ALGORITHMS-1
BINARY TREES Objectives Define trees as data structures Define the terms associated with trees Discuss tree traversal algorithms Discuss a binary.
8/3/2007CMSC 341 BTrees1 CMSC 341 B- Trees D. Frey with apologies to Tom Anastasio.
Chapter 11. Chapter Summary  Introduction to trees (11.1)  Application of trees (11.2)  Tree traversal (11.3)  Spanning trees (11.4)
Security of Broadcast Networks 1. Overview r Broadcast networks are used mostly for TV r Historical development r Commercial models r One-way or Two-way.
AVL DEFINITION An AVL tree is a binary search tree in which the balance factor of every node, which is defined as the difference between the heights of.
Objective: Understand Concepts related to trees.
Section 8.1 Trees.
Tree data structure.
Broadcast Encryption Amos Fiat & Moni Naor Advances in Cryptography - CRYPTO ’93 Proceeding, LNCS, Vol. 773, 1994, pp Multimedia Security.
Tree data structure.
CS223 Advanced Data Structures and Algorithms
Efficient State Update for Key Management
Lecture 36 Section 12.2 Mon, Apr 23, 2007
CS223 Advanced Data Structures and Algorithms
Trees.
Divide and Conquer Merge sort and quick sort Binary search
Presentation transcript:

Chair for Network- and Data-Security Broadcast Encryption for Stateless Receivers (Naor, Naor & Lotspiech 2001) André Adelsbach Chair for Network- and Data-Security Horst Görtz Institute Bochum, Germany

Broadcast Encryption (BE) Broadcast Encryption (Fiat & Naor ’93) Goal: Center has broadcast channel to large set of devices, … … but only a sub-set of allowed devices should have access m m m encrypt m, such that only allowed devices have access (keys to decrypt) 03/11/2004 Broadcast Encryption for Stateless Receivers

Broadcast Encryption Schemes Subset-Cover Framework (Naor, Naor, Lotspiech) Set of all devices: N={D1, …, Dn} Collection of Subsets: S = {S1, …, Sk} each Sj associated with long-lived key Lj each device d in Sj can compute Lj from its device keys Kd Sending to allowed set P = N \ R Sender finds cover {Si1, …, Sil} with P =  Sij encrypt session key K with Li1, …, Lil broadcast [i1, …, ij], [E(Li1 , K), …, E(Lil , K)], E(K, msg) Schemes differ in definition of collection of subsets S (matrix-based, tree-based, ….) computation of Lj TRADEOFFS !!!! 03/11/2004 Broadcast Encryption for Stateless Receivers

Complete Subtree Method Devices are leaves of a complete binary tree Collection of Subsets: S := {all complete subtrees} k D1 D2 Dn … D4………………………………………………… k0 k00 k001 k0011 03/11/2004 Broadcast Encryption for Stateless Receivers

Complete Subtree Method (II) Di gets keys of sub-trees of which it is a leaf: D4 := {k, k0, k00, k001, k0011} In other words: Di gets keys associated with nodes on path from root to Di k D1 D2 Dn … D4………………………………………………… k0 k00 k001 k0011 03/11/2004 Broadcast Encryption for Stateless Receivers

Complete Subtree Method (III) Revoking a set of receivers R: Find a minimal cover of non-revoked devices ! Algorithm: Trees hanging off Steiner Tree of R Example: R = {D1, D2, D4}  encrypt with k1, k01, k0010 D1 D2 Dn … D4………………………………………………… k1 ST{D1, D2, D4} k01 k0010 03/11/2004 Broadcast Encryption for Stateless Receivers

Performance of Complete-Subset Result: any N\R can be covered with r log(n/r) subsets Log(n) device keys for each device Only one decryption at receiver 03/11/2004 Broadcast Encryption for Stateless Receivers

Subset-Difference Method Idea: Increase number of subsets significantly to O(N2)  gain in freedom in covering non-revoked devices… S := {Sij | vi is an ancestor of vj} D1 D2 Dn …D4……………………………….… vi vj Sij := {Descendants of vi} \ {Descendants of vj} vi vj Result: any N\R can be covered with at most 2r -1 subsets and only 1.25r subsets on average! 03/11/2004 Broadcast Encryption for Stateless Receivers

Subset-Difference Method (II) Problem: Naïve key management for O(n2) subsets requires storage of O(n) keys! Solution: Clever computational key-assignment, s.t. each device stores less keys, but can compute his Lij Let G be a pseudo-random bit-string generator: G: {0,1}k  {0,1}3k , G(L) = GL(L)|GM(L)|GR(L) Top-Down labeling: Left Child: GL(L) Right Child: GR(L) L GL(L) GR(L) 03/11/2004 Broadcast Encryption for Stateless Receivers

Subset-Difference Method (III) Consider sub-trees Ti rooted at vi For each sub-tree Ti a leaf D should be able to compute Lij  vj is not an ancestor of u LABELij = GL(GR(Li)) Lij := GM(LABELij) Li Tree Ti vi GL(Li) GR(Li) GR(GL(Li)) GL(GR(Li)) GL(GL(Li)) GR(GR(Li)) vj u ………………………..…………………………. 03/11/2004 Broadcast Encryption for Stateless Receivers

Performance & Comparison Result (Subset Difference): any N\R can be covered with 2r-1 subsets ½ log2(n) device keys for each device Only one decryption at receiver Comparison: Method Length of Header # of Keys per Receiver Comp. Complexity # of Dec. Compl. Subtree r log(N/r) log N O(log log N) 1 Subset Diff. 2r -1 ½ log2 N O(log N) 03/11/2004 Broadcast Encryption for Stateless Receivers