average case analysis of revocation schemes for stateless
play

Average-Case Analysis of Revocation Schemes for Stateless Receivers - PowerPoint PPT Presentation

Introduction Key distribution schemes Generating functions Statistical results Our results Average-Case Analysis of Revocation Schemes for Stateless Receivers Daniel Panario School of Mathematics and Statistics Carleton University


  1. Introduction Key distribution schemes Generating functions Statistical results Our results Average-Case Analysis of Revocation Schemes for Stateless Receivers Daniel Panario School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with C. Eagle, Z. Gao, M. Omar and B. Richmond Analysis of Algorithms, April 2008 Analysis of Revocation Schemes Daniel Panario

  2. Introduction Key distribution schemes Generating functions Statistical results Our results Outline Introduction: the problem, applications. Key distribution schemes: Complete subtree scheme (CST); Subset difference scheme (SD); Layered subset difference scheme (LSD). Generating functions. Statistical results. Analysis of Revocation Schemes Daniel Panario

  3. Introduction Key distribution schemes Generating functions Statistical results Our results The problem A center broadcasts an encrypted message to a group of users: • some users may not be authorized (revoked users); • revoked users may collaborate but should not be able to obtain the message; • revoked users are not fixed (change dynamically); • encrypting messages can be done multiple times; • decrypting keys cannot be changed (stateless receivers). The problem: minimize user storage and number of encryptions, while still ensuring system security. Analysis of Revocation Schemes Daniel Panario

  4. Introduction Key distribution schemes Generating functions Statistical results Our results Applications • Pay-TV: users are subscribers; users are revoked if they don’t pay fee for particular channel. • DVD movies: users are DVD players, revoked if they are tied to illegal activity; • Blu-ray technology: security features use subset-difference scheme; • satellite communications, real-time information update, media content protection, etc. Analysis of Revocation Schemes Daniel Panario

  5. Introduction Key distribution schemes Generating functions Statistical results Our results Complete Subtree Scheme The complete subtree scheme (CST) is due to Wallner, Harder and Agee (1998) and independently Wong, Gouda and Lam (1998): • each user is represented as a unique leaf node in a balanced binary tree; • every node is assigned a key and each user holds the keys which are on the path from its leaf node to its root node. Other binary balanced trees key distribution schemes are: subset difference scheme (SD) and layered subset difference scheme (LSD). Analysis of Revocation Schemes Daniel Panario

  6. Introduction Key distribution schemes Generating functions Statistical results Our results Subset difference scheme Subset difference scheme (SD): Naor, Naor and Lotspiech, 2003. SD scheme: each user is represented as a unique leaf node in a balanced binary tree but in the SD scheme a key is assigned to every subset difference S i,j = S i /S j where node j is a descendent of node i and S i is the subtree rooted at the node i . If i = j, S ij is empty and no key is assigned. Analysis of Revocation Schemes Daniel Panario

  7. Introduction Key distribution schemes Generating functions Statistical results Our results Layered subset difference scheme Layered subset difference scheme (LSD): Halevy and Shamir, 2002. LSD scheme: key storage is reduced using layers. A layer is the set of levels between two consecutive multiples of log N = n levels, where N is number of leaves in the balanced binary tree. In the LSD scheme, S ij is said to be useful if i is a special level or i and j belong to the same layer. We have that any subset difference S ij is a union of two useful sets S ik ∪ S kj , for nodes i , k and j . Therefore, one only needs to store the useful sets on the same path saving key storage. Analysis of Revocation Schemes Daniel Panario

  8. Introduction Key distribution schemes Generating functions Statistical results Our results Notation Park and Blake (2006) assume that there are N = 2 n users in the system. We denote by ( i, j ) -priveleged users a set of j priveleged users that require i encryptions. The number of ( i, j ) -priveleged users in a system of 2 n users is the ′ , j ′ )-priveleged users in the left subtree and number of ( i ′ , j − j ′ )-priveleged users in the right subtree, in a system of ( i − i 2 n − 1 users. Analysis of Revocation Schemes Daniel Panario

  9. Introduction Key distribution schemes Generating functions Statistical results Our results Let a ( n ) denote the number of subsets of j privileged users which ij require exactly i encryptions. We have 2 n j a ( n ) � � ij x i y j . j =0 i =0 ′ users in the left subtree and j − j ′ users in the right If there are j subtree we have j i a ( n ) a ( n − 1) a ( n − 1) � � = i − i ′ j − j ′ . ij i ′ j ′ j ′ =0 i ′ =0 Using this recurrence, Park and Blake give recurrences for the generating functions of the numbers a ( n ) in the CST, SD and LSD ij schemes. Analysis of Revocation Schemes Daniel Panario

  10. Introduction Key distribution schemes Generating functions Statistical results Our results Generating functions (CST) Park and Blake gave generating functions for the CST, SD and LSD schemes. Theorem. The generating function for the CST scheme is T 0 ( x, y ) = 1 + xy, T n − 1 ( x, y ) 2 + (1 − x ) xy 2 n T n ( x, y ) = for n ≥ 1 . Analysis of Revocation Schemes Daniel Panario

  11. Introduction Key distribution schemes Generating functions Statistical results Our results Generating functions (SD) Theorem. The generating function for the SD scheme is S 0 ( x, y ) = 1 + xy, S n − 1 ( x, y ) 2 + D n − 1 ( x, y ) S n ( x, y ) = for n ≥ 1; where (1 − x ) xy 2 , D 0 ( x, y ) = y 2 n + 2 n y 2 n n − 2 � � 2 − i y − 2 i � D n − 1 ( x, y ) = (1 − x ) x for n = 2 , 3; i =0 and, for n ≥ 4 , we have that D n − 1 ( x, y ) equals to � 1 n − 3 � 2 − i y − 2 i + 2 n − 1 S i ( x, y ) − xy 2 i � 2 2 − i y − 2 i +1 � (1 − x ) xy 2 n � � 1 + 2 n . i =0 i =1 Analysis of Revocation Schemes Daniel Panario

  12. Introduction Key distribution schemes Generating functions Statistical results Our results Generating functions (LSD) Theorem. The generating function for the LSD scheme is L n ( x, y ) = H n n ( x, y ) , where (1) If 0 ≤ q ≤ √ n , H n q ( x, y ) = S q ( x, y ) where S q ( x, y ) is the generating function for the SD scheme for 2 q users. (2) If q = k √ n for some integer k , q − 1 ( x, y ) 2 + (1 − x ) xy 2 q H n H n q ( x, y ) = q − 2 i − 1 ( x, y ) − xy 2 i − 1 ” 2 +(1 − x ) xy 2 q 2 q 2 − i y − 2 i “ X H n q −√ n q −√ n − 1 i − 1 ( x, y ) − xy 2 i − 1 ” 2 +(1 − x 2 ) xy 2 q 2 q 2 − i y − 2 i “ X H n 2 1 +(1 − x 2 ) xy 2 q 2 q 2 − i y − 2 i . X i =0 Analysis of Revocation Schemes Daniel Panario

  13. Introduction Key distribution schemes Generating functions Statistical results Our results (3) If q = 1 + k √ n for some integer k , q − 1 ( x, y ) 2 + (1 − x ) xy 2 q . H n q ( x, y ) = H n (4) If q = 2 + k √ n for some integer k , q − 1 ( x, y ) 2 + (1 − x ) xy 2 q H n H n q ( x, y ) = +4(1 − x ) xy 2 q − 2 q − 2 ( H n q − 2 ( x, y ) − xy 2 q − 2 ) . (5) For all other cases, q − 1 ( x, y ) 2 + (1 − x ) xy 2 q H n H n q ( x, y ) = q − 2 i − 1 ( x, y ) − xy 2 i − 1 ” 2 +(1 − x ) xy 2 q 2 q 2 − i y − 2 i “ X H n i = s ( q )+1 +(1 − x ) xy 2 q − 2 s ( q ) 2 q − s ( q ) “ s ( q ) ( x, y ) − xy 2 s ( q ) ” H n 1 +(1 − x 2 ) xy 2 q 2 q 2 − i y − 2 i , X i =0 where s ( q ) = ⌊ q/ √ n ⌋√ n refers to the highest special level in a balanced subtree for 2 q users. Analysis of Revocation Schemes Daniel Panario

  14. Introduction Key distribution schemes Generating functions Statistical results Our results Mean number of encryptions Park and Blake use the above generating functions to give exact expressions for the mean number of encryptions over all privileged sets for the three considered schemes. They assume that each of the 2 N possible privileged sets have the same probability. The mean number of encryption is defined by i ia ( n ) � � = 1 ∂G n ( x, y ) j ij m ( n ) = (1 , 1) , 2 N 2 N ∂x where G n ( x, y ) can be either T n ( x, y ) , S n ( x, y ) or L n ( x, y ) , as defined before. Analysis of Revocation Schemes Daniel Panario

  15. Introduction Key distribution schemes Generating functions Statistical results Our results They prove the following exact mean number estimates. The mean number of encryptions over all privileged sets for the CST scheme is given by � n − 1 � m CST ( n ) = N � 2 k − N 2 − k 2 − , n ≥ 1 , k =0 with m CST (0) = 0 . 5 . The mean number of encryptions over all privileged sets for the SD scheme is given by, for n ≥ 4 , � n − 4 � n − 4 N 2 − N 2 − i n − 3 − i � � m SD ( n ) = 595 N 2 i − N 2 − i 2 2 k − k � � � 2048 − 13 − , i =0 i =0 k =1 with m SD (0) = 0 . 5 , m SD (1) = 0 . 75 , m SD (2) = 1 . 1875 and m SD (3) = 2 . 324 . Analysis of Revocation Schemes Daniel Panario

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend