explicit exclusive set systems with applications to broadcast encryption david p. woodruff mit focs...

19
Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Upload: irea-gallagher

Post on 26-Mar-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Explicit Exclusive Set Systems with

Applications to Broadcast Encryption

David P. WoodruffMIT

FOCS 2006

Craig GentryStanford

Zulfikar RamzanSymantec

Page 2: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Broadcast Encryption

Server

Clients

1 server, n clients

Server broadcasts to all clients at once

E.g., payperview TV, music, videos

Only privileged users can understand broadcasts

E.g., those who pay their monthly bills

Need to encrypt broadcasts

Page 3: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Subset Cover Framework [NNL]

Offline stage:

For some S ½ [n], server creates a key K(S) and distributes it to all users in S

Let C be the collection of S

Server space complexity ~ |C|

ith user space complexity ~ # S containing i

Page 4: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Subset Cover Framework [NNL]

Online stage:

Given a set R ½ [n] of at most r revoked users

Server establishes a session key M that only users in the set [n] n R know

Finds S1, …, St 2 C with [n] n R = S1 [ … [ St

Encrypt M under each of K(S1), …, K(St)

Content encrypted using session key M

Page 5: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Subset Cover Framework [NNL]

Communication complexity ~ t

Tolerate up to r revoked users

Tolerate any number of colluders

Information-theoretic security

Page 6: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

The Combinatorics Problem Find a family C of subsets of {1, …., n}

such that any large set S µ {1, …, n} is the union of a small number of sets in C

S = S1 [ S2 [ [ St

Parameters: Universe is [n] = {1, …, n} |S| >= n-r Write S as a union of · t sets in C

Goal: Minimize |C|

Page 7: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

A Lower Bound

Claim:

1. At least sets of size ¸ n-r

2. Only different unions

3. Thus,

4. Solve for |C|

Proof:

Page 8: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Known Upper Bounds

Bad: once n and r are chosen, t and |C| are fixed

t |C| authors

(r log n / log r)2 (r log n / log r)2 GSY

r log n/r 2n LNN, ALO

2r n log n LNN

r3 log n / log r r3 log n /log r KRS

Page 9: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Known Upper Bounds Only known general result:

If r · t, then |C| = O(t3(nt)r/t log n) [KR]

Drawbacks: Probabilistic method To write S = S1 [ S2 [ … [ St , solve Set-CoverSet-Cover C has large description No way to verify C is correct Suboptimal size:

Page 10: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Our Results Main result: tight upper bound |C| = poly(r,t)

n, r, t all arbitrary

Match lower bound up to poly(r,t) In applications r, t << n When r,t << n, get |C| = O(rt )

Our construction is explicit Find sets S = S1 [ … [ St in poly(r, t, log n) time Improved cryptographic applications

Page 11: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Cryptographic Implications Our explicit exclusive set system yield almost optimal

information-theoretic broadcast encryption and multi-certificate revocation schemes

General n,r,t Contrasts with previous explicit systems

Poly(r,t, log n) time to find keys for broadcast Contrasts with probabilistic constructions

Parameters For poly(r, log n) server storage complexity, we can

set t = r log (n/r), but previously t = (r2 log n)

Page 12: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Techniques Case analysis:

r, t << n:

algebraic solution

general r, t:

use divide-and-conquer approach to reduce to previous case

Page 13: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Case: r,t << n Find a prime p = n1/t +

Users [n] are points in (Fp)t

Consider the ring Fp[X1, …, Xt]

Goal: find set of polynomials C such that for any R ½ [n] with |R| · r, there exist p1, …, pt 2 C such that

R = Variety(p1, …, pt)

Page 14: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Case: r,t << n First design a polynomial collection so that for

any R ½ [n] with |R| · r such that for every coordinate i, 1 · i · t,

All |R| points differ on the ith coordinate (*)

Then perform a few permutations :[n] -> [n] and construct new polynomial collections on ([n]). Take the union of these collections.

Can find the deterministically using MDS codes

Page 15: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Example Collection: r = 2, t = 3For r = 2, t = 3, our collection is:

1. (X1 – a)(X1 – b) for all distinct a,b

2. aX1 + b – X2 for any a, b 2 Fp

3. aX2 + b – X3 for any a,b 2 Fp

Revoke u = (u1, u2, u3) and v = (v1, v2, v3) u1 v1, u2 v2, and u3 v3

Let p1 = (X1 – u1)(X1-v1). Find p2 by interpolating from au1 + b – u2 = 0, av1 + b – v2 = 0

Find p3 by interpolation. Variety(p1, p2,p3) = u, v

We broadcast with keys K(pi), distributed to users which don’t vanish on pi

If u1 v1, u2 = v2, and u3 v3, then (u1, u2, v3) also in variety…

Page 16: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Our General Collection

and

Intuition: First type of polynomials implement a“base case”.

Second type of polynomials implement “AND”s.

Page 17: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Wrapping up the r,t << n case.

Using many tricks – balancing techniques, expanders, etc., can show even without distinct coordinates, can achieve size O(rt ).

Almost matches the (t ) lower bound.

Open question: resolve this gap.

Page 18: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

General n, r, t

1 n

Let m be such that r/m, t/m << n

For every interval [i, j], form an exclusive set system with n’ = j-i+1, r’ = r/m, t’ = t/m

Given a set R, find intervals which evenly partition R.

i jx x x x x x

Problem! n2 term ?!?

Fix:- hash [n] to [r2] first

- do enough hashes so there is an injective hash for every R

- apply construction above on [r2]

Page 19: Explicit Exclusive Set Systems with Applications to Broadcast Encryption David P. Woodruff MIT FOCS 2006 Craig Gentry Stanford Zulfikar Ramzan Symantec

Summary and Open Questions Main result: tight explicit upper bound |C|

= poly(r,t) n, r, t arbitrary Cover sets in poly(r, t, log n) time Optimal # of keys per user

Other result: Slightly improve [LS] lower bound on keys per user in any scheme using a relaxed sunflower lemma: from ( )/(rt) to ( )/r

Open question: improve poly(r,t) factors