Presentation is loading. Please wait.

Presentation is loading. Please wait.

Korea University CRYPTO ‘05 Jung Yeon Hwang, Dong Hoon Lee, Jong In Lim Generic Transformation for Scalable Broadcast Encryption Schemes.

Similar presentations


Presentation on theme: "Korea University CRYPTO ‘05 Jung Yeon Hwang, Dong Hoon Lee, Jong In Lim Generic Transformation for Scalable Broadcast Encryption Schemes."— Presentation transcript:

1 Korea University CRYPTO ‘05 Jung Yeon Hwang, Dong Hoon Lee, Jong In Lim Generic Transformation for Scalable Broadcast Encryption Schemes

2 2 Contents Broadcast Encryption (BE) Concept / Applications Related Works Our Approach for Scalability Design Principle Generic Transformation Compiled Examples Concluding Remarks

3 3 Broadcast Encryption : Concept Message Sender s : session key, m :contents HeaderBody Broadcast Encryption Message Contents Subscribers

4 4 BE : Applications Satellite-based Business Group Communication Digital Rights Management Home network content protection AACS (Advanced Access Content System) group 2004. 7. IBM, Intel, Microsoft, Panasonic, Sony, Toshiba, Disney, Warner Bros. Studios

5 5 BE : Basic Goal How to efficiently exclude illegal users from a privileged set ? Revoked UserPrivileged User Transmission Overhead (TO) User Storage Overhead (SO) Computation Overhead (CO) one-to-many communication : Transmission efficiency

6 6 BE : Related Works Unicast & Power-Set Solutions Middle Ground : Revocation-state ? Define a collection of subsets - Combinatorial Approach (collusion) - Tree Structure (SD,LSD,SSD), Line Segment (PI) Reveal Information of Revoked Users - Secret Sharing Accumulate Information of Privileged Users - One-Way Accumulator

7 7 Problem of Scalability & Our Solution Large Number of Users? Impractical due to Excessive User Storage and/or Computation Overhead Modular Approach for Scalability Reduction in User Storage and Computation Slight Increase in Transmission Overhead Structure Preserving - Security - Type of Key Sharing : Symmetric / Public Key - Connection State : Stateful / Stateless

8 8 Our Solution : Modular Approach … … SeSe S e1 S e18 User Structure : n=w s w-ary Tree …… … U e184 Sibling Set S a Users Independent & Hierarchical Application of BE to small subsets e 1 8 1234 5 6 78 4 1 2 3 5 6 78 Height = s

9 9 Our Solution : Modular Approach … … Independent & Hierarchical Application of BE - Key Assignment SeSe S e1 S e18 Tree …… … U e184

10 10 Our Solution : Modular Approach … … SeSe S e1 S e18 Independent & Hierarchical Application of BE - Revocation Tree …… … Revoked Users (leaves) Revoked nodes (Steiner Tree) u e115 u e182

11 11 Our Solution : Modular Approach … SeSe S e1 S e18 Independent & Hierarchical Application of BE - Revocation Tree … Revoked nodes …… … S e11 u e115 u e182

12 12 Our Solution : Performance Analysis User Storage Overhead 1 + s ᆞ SO B (n 1/s ) Preserve “log-key restriction” (1+ s log n 1/s = 1+ log n) Computation Overhead CO B (n 1/s ) Transmission Overhead ≤ s ᆞ TO B (n 1/s ) Sibling Set Height : s w=n 1/s

13 13 Examples User Devices with Limited Resources Transmission-Restricted/Low Bandwidth Application

14 14 Example 1 : For Low Resource Environment BE scheme B1 with log n +1 SO, 2 r TO, n CO Transformation BE scheme B1 with log n +1 SO, 2 r log n /log log n TO, log n CO

15 15 Example 1 : For Low Resource Environment User Structure : Number line U1U1 U2U2 U3U3 UnUn U n-1 U4U4 UiUi … … Basic Tool : One-way chain points chain-value F: {0,1} κ → {0,1} κ U5U5 U6U6 F 1 (sd i ) F 2 (sd i )F j-i (sd i ) sd i sd i ← R {0,1} κ i 1 … …

16 16 Example 1 : For Low Resource Environment Revocation of B1 : 2r (r : number of revoked users) F 3 (sd 1 )F 2 (sd 8 ) F 1 (sd 9 )F 20 (sd 32 ) Key Assignment of B1 : 1+log n (Log-Key Restriction) chain-values F 2 (sd 8 ) F(sd 5 ) F 10 (sd 16 ) sd 6 F 5 (sd 1 ) F 26 (sd 32 ) … n computations 168

17 17 Example 1 : Security Subset Cover Framework (by Naor et al.) Subset : Interval (line segment) Existence of Pseudo-Random Sequence Number Generator Key assignment method satisfies Key Indistinguishability

18 18 Example 2 : Low Bandwidth BE Jumping One-way Chain Schemes by Jho et. al at Eurocrypt’05 Application of Different BE Schemes : B2 Performance. TO : [r/2] +1, SO : (n 2 +4n)/8, CO : n/2 … ………

19 19 Performance Analysis N=10 8 users and w=100 for worst case Transmission Overhead User Storage Overhead The gap of log key restriction SD B1 B2 B1 B2 SD

20 20 Concluding Remarks Average case analysis Traitor Tracing & Other Properties Multi-dimensional Cube

21 21 Thank you


Download ppt "Korea University CRYPTO ‘05 Jung Yeon Hwang, Dong Hoon Lee, Jong In Lim Generic Transformation for Scalable Broadcast Encryption Schemes."

Similar presentations


Ads by Google