PBIBD and its applications in Cryptology
Bimal Roy
Indian Statistical Institute www.isical.ac.in/∼bimal
PBIBD and its applications in Cryptology Bimal Roy Indian - - PowerPoint PPT Presentation
PBIBD and its applications in Cryptology Bimal Roy Indian Statistical Institute www.isical.ac.in/ bimal In this talk ... We will first describe the combinatorial framework of PBIBD And then proceed to show its applications in Cryptology 1.
Indian Statistical Institute www.isical.ac.in/∼bimal
◮ X is the main set of elements ◮ A is a set of subsets of X, called blocks
◮ |X| = v and |A| = b ◮ Each block in A contains exactly k elements ◮ Each element in X occurs in r blocks ◮ Each pair of elements in X occurs in exactly λ blocks
◮ There are b blocks, each of size k, on a v-set X ◮ It is an association scheme with m associate classes ◮ Each element of X has exactly ni number of i-th associates ◮ Two i-th associate elements occur together in λi blocks
◮ Security of the WSN depends on efficient key distribution ◮ PKC and ECC are too computation intensive for WSNs ◮ Thus we need distribution of keys in nodes prior to deployment
◮ Scalability: Allow post-deployment increase in network size ◮ Efficiency: Time taken for communication between nodes ◮ Storage: Amount of memory required to store the keys ◮ Computation: No. of cycles needed for key agreement ◮ Communication: No. of messages sent for key agreement
◮ Key Connectivity: The probability that two nodes share
◮ Resiliency: Even if a number of nodes are compromised and
◮ Number of sensor nodes = n(n − 1)/2 = 10 ◮ Number of keys in key-pool = n(n − 1)/2 = 10 ◮ Number of keys in each node = 2(n − 2) = 6 ◮ Number of keys common to any two nodes = 4 or (n − 2) = 3
The values of V (s) and E(s) in the table are experimental data.
◮ Is it possible to reduce the number of keys, but still improve
◮ How can we repeatedly apply the PBIBD schemes and
◮ Supplier distributes products for only authorized users to use. ◮ Malicious authorized users (traitors) create pirated copies and
◮ Prevent authorized users to produce unauthorized copies. ◮ Trace the source of piracy if unauthorized copies are created. ◮ Trace traitors without harming the innocent users.
◮ A set of k personal keys denoted by P(Ui). ◮ Enabling block to create session key s using personal keys. ◮ The plaintext message encrypted using the session key s. Example: Number of users = 4, and Key pool = {000, 001, 010, 011, 100, 101}. P(U1) = {000, 010, 100} P(U2) = {000, 011, 101} P(U3) = {001, 011, 100} P(U4) = {001, 010, 101} Session key = 110. (obtained by binary addition of the keys modulo 2) No other combination of keys can generate the same session key upon binary addition. {000, 001, 010} → 011, {000, 001, 011} → 010, {000, 001, 100} → 101, {000, 001, 101} → 100, {000, 010, 011} → 001, {000, 010, 101} → 111, {000, 011, 100} → 111, {001, 010, 100} → 111, {000, 100, 101} → 001, {001, 010, 011} → 000, {001, 011, 101} → 111, {001, 100, 101} → 000, {010, 011, 100} → 111, {010, 011, 101} → 100, {010, 100, 101} → 011, {011, 100, 101} → 010.
i=1 P(Ui) and |F| = k.
◮ If less than a certain number of authorized users collude, the
◮ If more than this number of traitors collude, the distributor
◮ Number of total users: b = n(n − 1)/2 = 10 ◮ Number of keys for each user: k = 2(n − 2) = 6 ◮ Number of keys in key-pool: v = n(n − 1)(n − 2)/2 = 30
◮ For a system with N users, each user having a set of O(
4
◮ That is, for a set of 10,000 users, each user having a set of
4
◮ Secret sharing scheme with n participants, 1 secret image ◮ Secret image to be split into n shadow images called shares ◮ Certain qualified subsets of participants can recover the secret ◮ Other forbidden sets of participants have no information
◮ There are n participants and 1 secret image ◮ Secret image to be split into n shadow images called shares ◮ Any m-subset of participants can recover the secret ◮ No t-subset of participants can recover the image if t < m
m(w(S1 X) − w(S0 X)).
◮ If β, γ are 1-st associates, αX(m) = 1 m(r − λ1) ◮ If β, γ are 2-nd associates, αX(m) = 1 m(r − λ2)
◮ X = {1, 2, 3, 4, 5, 6} and ◮ A = {{1, 2, 3}, {1, 4, 5}, {2, 4, 6}, {3, 5, 6}}
2 or 1 4.
1 2 for 1 & 6 and 1 4 for 1 & 2