Broadcast Encryption CMLAB, 2008 Outline
Total Page:16
File Type:pdf, Size:1020Kb
Broadcast Encryption CMLAB, 2008 Outline • Introduction • Definition • Key management • Secret key distribution • Traitor tracing for broadcast encryption Introduction • Broadcast encryption ▫ Amos Fiat & Moni Naor, CRYPTO’93 ▫ Securely transmit a message to all members of the privileged subset Privileged users Broadcast Center Non-privileged users Introduction • How broadcast encryption works? ▫ Key management block Is sent at the beginning of a broadcast Is prerecorded on blank media ▫ Each recipient (device) reads the key management block and processes it to yield a management key Introduction • Simplest broadcast scheme Introduction • Applications ▫ Copy protection for PC games Introduction • Broadcast encryption vs. public key cryptography ▫ Broadcast encryption is fast ▫ All calculations in broadcast encryption are done using simple symmetric encryptions ▫ Public key calculations require exponentiation operations over a finite field Introduction ▫ For classic cryptography, secrets are easier to be found while handshaking ▫ For broadcast encryption, secrets are hidden much more deeply in the software Definition-Preliminaries • U ▫ The set of receivers (users) • S ▫ S U ▫ The set of revoked receivers (users who we do not want to be able to decrypt the next transmission) • T ▫ U \S ▫ The set of privileged (i.e., non-revoked) users • F: KxMF→CF ▫ F: encryption algorithm K: key space MF: message space CF: ciphertext space Definition • Broadcast encryption ▫ A broadcast encryption scheme is a triple of algorithm (SETUP, BROADCAST, DECRYPT) such that: SETUP takes a user u U and constructs that receiver’s private information PuP BROADCAST takes the list of revoked users S and the session key and outputs a broadcast message M A user u U runs the decryption algorithm DECRYPT(M, Pu,u) to compute the K associated with M, assuming u T 11 Definition-Resiliency • Resiliency ▫ A broadcast scheme is called resilient to set S if for every subset T (T∩S=Φ), no eavesdropper that has all secrets associated with members of S, can obtain knowledge of the secret common to T ▫ k-resilient The scheme is resilient to any set S U of size k U T S k Definition-Resiliency ▫ (k,p)-resilient The scheme is resilient to a 1-p fraction of sets S U of size k U T S k 13 Definition-Resiliency • Example: A basic scheme ▫ For every set B U, 0|B|k, define a key KB and give KB to every user xU-B ▫ The common key to the privileged set T is the exclusive or of all keys KB, BU-T ▫ Every coalition S with less than k users will all be missing key KS and will therefore be unable to compute the common key for any privileged set T (T∩S=Φ) K B1 KB2 S B2 Bj B1 T KBj 14 Key management • Issues ▫ How to assign and store the keys ▫ How to save the key storage for both the server and clients ▫ How to update the keys when users join or leave • A comprehensive survey A. Wool, 2000 A simple scheme The extended-header scheme Suppose that a program p belongs to t packages for t users Broadcast ENCKp(p) to users Header: ID Key 1 Es1(Kp) …. … t Est(Kp) Key management ▫ Matrix-based schemes Content protection for recordable media (CPRM) Content protection for prerecorded media (CPPM) (for the DVD audio) Media key block Device keys Drawbacks: The size of the matrix Sensitive to insider attacks 15 Key management ▫ The media key block is prerecorded on blank media at manufacturing time ▫ The key matrix is generated by the CPRM licensing agency and is preembossed in the lead-in area on the disk ▫ The media key block is the encryption of the media key using different device key 16 Ed00(km) Ed01(km) …… >2500 Ed10(km) ….. ….. Ekm(data) 16 Key management – CPRM key matrix 16 device keys 17 18 Key management • Other possible scenarios 19 Key management • The state update problem ▫ Content is encrypted using a group key which is known to a group of users in many scenarios ▫ When users leave or join the group, the group key must be changed Prevent leaving members from decrypting content in the future Prevent joining members from decrypting previous content (backward secrecy) O(n) messages ▫ How to reduce the overhead of the key update messages? Key management ▫ When a group member leave, GC must change the group key and inform all group members Kg(Kg’) ? Forward secrecy? S1(Kg’), S2(Kg’), S3(Kg’), … ▫ Tree-based schemes Wallner, 1997 and Wong, 1997 → Logical key hierarchy (LKH) trees Manage key changes 20 Key management – LKH (Logical Key Hierarchy) trees – A central server (key server) for each group holds a key tree – Each device is associated with a leaf of the tree – Each member holds a key path, from leaf up to the root 21 Key management – Suppose device 13 is revoked – Using sibling keys(gray nodes) to encrypt the new management key and delivering the encrypted management key to sub-trees of these gray nodes 22 23 Key management • But how to deliver new internal keys? Key management – NNL trees – IBM, 2001 – The photographic negative of the LKH tree – The device has every key in the tree except the keys between its leaf and the root 24 Secret key distribution • Secret Sharing Schemes Xn: a set of users, Γ 2X is a set of subsets called autorized subsets. In a secret sharing scheme, the TA (trusted authority) has one secre t value k G F( q ), called the key. The TA will distribute secret information to each user in X , in such a way that any authorized subset can compute k from the shares they jointly hold, but no una uthorized subset has any information about k. The secret information given to user iu will be denoted i and is called the share of user i. 25 Secret key distribution • Shamir threshold KPS (Key pre-distribution scheme) Let qn1 be a prime power 1. The TA chooses n distinct non-zero ran dom numbers xii G F( q ), and gives x to user i (1 i n ). These values do not need to be secret. 2. The TA constructs a random polynomial of degree at most t-1 t-1 f( x ) a x ii i 0 having coefficients in G F( q ). The key is the constant term a 0 . 3. The TA computes the polynimail yii f( x ) and gives yii to user . 26 Secret key distribution • Shamir threshold KPS e.g. Suppose we construct a scheme in GF (17 ) and the public values are xi i,1 i 5. Suppose that the TA chooses the polynomail f ( x) 13 10 x 2 x 2 , so the key is 13. The shares that are distribute d are y1 f (1) 8, y 2 f (2) 7 ,y3 f (3) 10 , y 4 f (4) 0 ,y 5 f (5) 11 Any 3 of the ordered pairs (1,8), (2,7), (3,10), (4,0), (5,11) can be used to reconstruc t the polynomial f . 27 28 Traitor tracing for broadcast encryption • Tracing traitors ▫ B. Chor, A. Fiat, M. Naor, & B. Pinkas, CRYPTO’94 & 98 ▫ Confiscate a pirate decoder to determine the identity of a traitor ▫ Randomly assign the decryption keys to users ▫ Make the probability of exposing an innocent user negligible 29 Traitor tracing for broadcast encryption • A simple scheme ▫ Keys 2k2 … a a 2 a1,1 1,2 1,2 k … a 2 a 2 ,1 a 2,2 2,2 k l … … … … … a a a 2 l ,1 l ,2 l ,2 k ▫ l hash functions h1, h2, …, hl 2 hi: {1,…,n}{1,…,2k } hi(u) the ith key for user u 30 Traitor tracing for broadcast encryption ▫ Personal key of user u P(u) {a , a ,..., a } … 1,h1 (u ) 2,h2 (u ) l ,hl (u ) Enabling ▫ 2k2l encrypted keys block … a a 2 a1,1 1,2 1,2 k … s E a (s1 ), E a (s1 ),..., E a (s1 ) … … … Cipher 1 ,1 1 , 2 2 a a 1, 2 k a 2 block 2 ,1 2,2 2,2 k ... … E (s ), E (s ),..., E (s ) a l ,1 l a l ,1 l a 2 l Decrypt l , 2 k a a a 2 l ,1 l ,2 l ,2 k ▫ Decrypt si and compute secret s s s1 s2 ... sl 31 Traitor tracing for broadcast encryption • Tracing s {a }{a a }{a a a }...{ a a ,... a 2 } 1 1,1 1,1 1,2 1,1 1,2 1,3 1,1 1,2 1,2 k s {a }{a a }{a a a }...{ a a ,... a 2 } 2 2 ,1 2 ,1 2 ,2 2 ,1 2 ,2 2 ,3 2,1 2 ,2 2 ,2 k .... s {a }{a a }{a a a }...{ a a ,... a 2 } l l ,1 l ,1 l ,2 l ,1 l ,2 l ,3 l ,1 l ,2 l ,2 k {a1,3 , a 2,2 ,..., a l ,2 } F 1 1 1 Compute h1 (3), h2 (2),..., hl (2) {user 1, user 5}, {user 2, user 3, user 5}, {user5, user 6}, …,{user 2, user 7, user 9}, ….,{…} user 1 x x user 2 x …. user 5 x x x x x … user n x x Traitor tracing for broadcast encryption-Examples • Efficient Methods for Integrating Traceability and Broadcast Encryption, E. Gafni, J. Staddon, and Y. L. Yin, CRYPTO’99, LNCS 1666, pp. 372-387, 1999 33 Traitor tracing for broadcast encryption-Examples • Jessica Staddon ▫ Combinatorial properties of frameproof and traceability codes. J. Staddon, D. R. Stinson and R. Wei. IEEE Transactions on Information Theory (2001), 1042-1049.