some advances in broadcast encryption and traitor tracing
play

Some Advances in Broadcast Encryption and Traitor Tracing Duong - PowerPoint PPT Presentation

Some Advances in Broadcast Encryption and Traitor Tracing Duong Hieu Phan ( S eminaire LIPN - 18 Novembre 2014 ) Duong Hieu Phan Some Advances in BE&TT S eminaire LIPN 1 / 42 Multi-receiver Encryption From One-to-one to


  1. Some Advances in Broadcast Encryption and Traitor Tracing Duong Hieu Phan ( S´ eminaire LIPN - 18 Novembre 2014 ) Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 1 / 42

  2. Multi-receiver Encryption From “One-to-one” to ‘one-to-many” communications Provide all users with the same key → problems: Impossibility to know the source of the key leakage (traitor) 1 Impossibility to revoke a user, except by resetting the parameters 2 Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 2 / 42

  3. Broadcast Encryption [B91,FN94] & Traitor Tracing [CFN94] BO: 12 32:47 BO: 12 32:47 BO: 12 32:47 BO: 12 32:47 BO: 12 32:47 Desired Properties Tracing traitors from a pirate decoder 1 ◮ White-box tracing ◮ Black-box confirmation, black-box tracing Revoking non-legitimate users 2 Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 3 / 42

  4. Broadcasting & Tracing Composed by G.Allegri (around 1630) for use in the Sistine Chapel on Wednesday and Friday Kept secret by the Vatican Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 4 / 42

  5. Broadcasting & Tracing The piece was revealed in 1771 → Mozart Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 5 / 42

  6. Broadcasting & Tracing The piece was revealed in 1771 → Mozart Only Mozart can do it! Same idea in traitor tracing: identify who is capable of producing the pirate decoder Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 5 / 42

  7. Outline Randomized Exclusive Set System 1 Lattice-based Encryption 2 Extended Models 3 Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 6 / 42

  8. Outline Randomized Exclusive Set System 1 Lattice-based Encryption 2 Extended Models 3 Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 7 / 42

  9. Exclusive Set System (ESS) [ALO98] F is an ( N , ℓ, r , s ) -ESS if: F : a family of ℓ subsets of [ N ] For any R ⊆ [ N ] of size at most r , there exists S 1 , . . . S s ∈ F s.t. s � [ N ] − R = S i i = 1 Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 8 / 42

  10. Exclusive Set System (ESS) [ALO98] F is an ( N , ℓ, r , s ) -ESS if: F : a family of ℓ subsets of [ N ] For any R ⊆ [ N ] of size at most r , there exists S 1 , . . . S s ∈ F s.t. s � [ N ] − R = S i i = 1 From ESS to Revoke System Each S i ∈ F is associated to a key K i User u receives all keys K i that u ∈ S i To revoke a set R ⊆ [ N ] of size at most r : ◮ Find S 1 , . . . S s ∈ F s.t. [ N ] − R = � s i = 1 S i ◮ Encrypt the message with each key K i Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 8 / 42

  11. NNL Schemes viewed as Exclusive Set Systems [NNL01] S 1 S S 2 3 S S S S 5 6 7 4 S S S S S S S S 9 10 11 12 13 14 15 8 u u u u u u u u 2 3 5 1 4 6 7 8 F = { S 1 , S 2 , . . . , S 15 } S i contains all users ( i.e. leaves) in the subtree of node i (e.g. S 2 = { u 1 , u 2 , u 3 , u 4 } ) Revoked set R = { u 4 , u 5 , u 6 } Encrypt with keys at S 4 , S 7 , S 10 Complete-subtree is a ( N , 2 N − 1 , r , r log ( N / r )) -ESS Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 9 / 42

  12. Exclusive Set System under Code’s View u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 S 1 1 1 1 1 1 1 1 1 S 2 1 1 1 1 S 3 1 1 1 1 S 4 1 1 S 5 1 1 S 1 S 6 1 1 S S 2 3 S 7 1 1 S S S S 4 5 6 7 S 8 1 1 S S S S S S S S 12 14 9 10 11 13 15 8 S 9 1 u u u u u u u u 2 3 5 1 4 6 7 8 S 10 1 S 11 1 S 12 1 S 13 1 S 14 1 S 15 1 Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 10 / 42

  13. NNL Schemes u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 S 1 1 1 1 1 1 1 1 1 S 2 1 1 1 1 S 3 1 1 1 1 S 4 1 1 S 5 1 1 S 1 S 6 1 1 S 7 1 1 S S 2 3 S 8 1 1 S S 9 1 S S S 4 5 6 7 S 10 1 S S S S S S S S S 11 1 9 10 11 12 13 14 15 8 S 12 1 u u u u u u u u 2 3 5 1 4 6 7 8 S 13 1 S 14 1 S 15 1 Tracing Levels for NNL schemes Relaxed level of black-box tracing Black-box tracing for “naive” decoders Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 11 / 42

  14. NNL Schemes u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 S 1 1 1 1 1 1 1 1 1 S 2 1 1 1 1 S 3 1 1 1 1 S 4 1 1 S 5 1 1 S 1 S 6 1 1 S 7 1 1 S S 2 3 S 8 1 1 S S 9 1 S S S 4 5 6 7 S 10 1 S S S S S S S S S 11 1 9 10 11 12 13 14 15 8 S 12 1 u u u u u u u u 2 3 5 1 4 6 7 8 S 13 1 S 14 1 S 15 1 Weakness in Black-box Tracing Highly structured matrix Pirate could thus detect “dangerous” queries and refuse to decrypt Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 11 / 42

  15. NNL Schemes u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 S 1 1 1 1 1 1 1 1 1 S 2 1 1 1 1 S 3 1 1 1 1 S 4 1 1 S 5 1 1 S 1 S 6 1 1 S 7 1 1 S S 2 3 S 8 1 1 S S 9 1 S S S 4 5 6 7 S 10 1 S S S S S S S S S 11 1 9 10 11 12 13 14 15 8 S 12 1 u u u u u u u u 2 3 5 1 4 6 7 8 S 13 1 S 14 1 S 15 1 In General, Previous Results for ESS Black-box tracing for “naive” decoders (decrypt all ciphertexts without any strategy) c -traceability: a white-box tracing for “imperfect” decoders Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 11 / 42

  16. NNL Schemes u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 S 1 1 1 1 1 1 1 1 1 S 2 1 1 1 1 S 3 1 1 1 1 S 4 1 1 S 5 1 1 S 1 S 6 1 1 S 7 1 1 S S 2 3 S 8 1 1 S S 9 1 S S S 4 5 6 7 S 10 1 S S S S S S S S S 11 1 9 10 11 12 13 14 15 8 S 12 1 u u u u u u u u 2 3 5 1 4 6 7 8 S 13 1 S 14 1 S 15 1 Our Objectives Black-box tracing in ESS for “smart” decoders (efficiency comparable to NNL schemes) Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 11 / 42

  17. Randomized ESS Recall 1 row → 1 subset → 1 key 1 column → 1 user → user j has key K i iff M ij = 1 Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 12 / 42

  18. Randomized ESS Recall 1 row → 1 subset → 1 key 1 column → 1 user → user j has key K i iff M ij = 1 Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 12 / 42

  19. Randomized ESS Property Set n = r log 2 ( N 2 e / r ) , b = 4 r With overwhelming probability → ( N , 8 r 2 log N , r , 8 r log N ) -ESS. (complete-subtree is ( N , 2 N − 1 , r , r ( log ( N / r )) -ESS) Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 12 / 42

  20. Tracing for ESS White-box Tracer can open the box → get the pirate word w which is the union of traitors’ codewords Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 13 / 42

  21. White-box Tracing for ESS White-box Tracing ( r , s , N , l ) -ESS is also a r -disjunct matrix, i.e., no column is contained in the union of any r other columns r -disjunct matrix: from the union of at most r columns, one can find back the r columns (the Group Testing technique ) ↔ Given the pirate word w , trace back the traitors Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 14 / 42

  22. White-box Tracing for ESS White-box Tracing ( r , s , N , l ) -ESS is also a r -disjunct matrix, i.e., no column is contained in the union of any r other columns r -disjunct matrix: from the union of at most r columns, one can find back the r columns (the Group Testing technique ) ↔ Given the pirate word w , trace back the traitors Challenge for Black-box Tracing How to find the pirate word w ? Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 14 / 42

  23. Black-box Tracing for ESS Shadow Group Testing Technique[NPP , Algorithmica13] Black-box access to pirate decoder Asking random queries of the same form as broadcasted ciphertexts Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 15 / 42

  24. Black-box Tracing for ESS Shadow Group Testing Technique[NPP , Algorithmica13] Black-box Access to Pirate Decoder Asking random queries of the same form as broadcasted ciphertexts Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 15 / 42

  25. Black-box Tracing for ESS Shadow Group Testing Technique[NPP , Algorithmica13] Test the decryptability of the piarte decoder on the queries → Get “Feedback” vector = union of the columns at position 1 in the pirate word w Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 15 / 42

  26. Black-box Tracing for ESS Shadow Group Testing Technique[NPP , Algorithmica13] We show that the matrix of queries is also an ESS → From “Feedback” vector, get the pirate word w Large number of queries → the tracing is efficient when the number of traitors is O ( log N ) Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 15 / 42

  27. Black-box Tracing for ESS Shadow Group Testing Technique[NPP , Algorithmica13] In brief: We get ( N , 8 r 2 log N , r , 8 r log N ) -ESS Ciphertext: constant factor w.r.t the complete-subtree and a log N factor w.r.t the subset-difference scheme The first black-box tracing ESS against non-naive pirates Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 15 / 42

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend