Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited

ESORICS 2014 Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park Korea University, Korea University, Korea University, Sangmyung University

Overview 

Motivation 





Public-key revocation encryption (PKRE) is a powerful primitive since any user can send a ciphertext to a set of users excluding revoked users We revisit the method of Dodis and Fazio that provides a PKRE scheme from subset difference (SD) methods to reduce the size of private keys and public keys

Results 





We introduce single revocation encryption (SRE) and construct an efficient SRE scheme We present an efficient PKRE scheme with shorter private keys and public keys by combining the SD method and our SRE scheme Our PKRE scheme provides the (weak) tracing functionality since it is derived from the SD method 2

Introduction 

Revocation Encryption 



Revocation encryption is a mechanism to efficiently send an encrypted message to a set of receivers by excluding a set R of revoked users The application includes pay-TV systems, DVD content distribution systems, and file systems O

O X Encrypted DVD contents DVD players 3

Introduction 

A Classification of (Public-Key) Revocation Encryption 



There are two general classes of PKRE schemes depending on their construction approaches The first one is revocation schemes based on binary trees and the second one is revocation schemes based on bilinear groups

e(ga,gb)=e(g,g)ab

BGW05 NNL01

CS + IBE

BW06 DF02

GW09

SD + HIBE

LSW10

We focus on this approach !!

CT = O(N1/2) or Decrypt = O(r) 4

Introduction 

The Subset Difference Method of Naor et al. [NNL01] 



The subset difference (SD) method is a general methodology to construct efficient (symmetric-key) revocation encryption schemes A user is assigned to a leaf in a tree and a ciphertext is associated with the minimum number of subsets that covers non-revoked users

PRG(-)

SD + PRG  SKRE SK = O(log2N) CT = O(r)

N = # of leaf nodes r = # of revoked nodes 5

Introduction 

Generic PKRE of Dodis and Fazio [DF02] 



Dodis and Fazio showed that a PKRE scheme can be constructed by combining the SD scheme and any HIBE scheme This method essentially uses the key delegation property of HIBE to decrypt a ciphertext

SKHIBE HIBE.Delegate(-)

SD + HIBE  PKRE but the overhead (log N) of HIBE is added

SKHIBE

SKHIBE

6

Introduction 

Our Motivation 



The generic PKRE scheme of Dodis and Fazio is not satisfactory since the size of private keys and public keys increases by log N factor because of the overhead of an HIBE scheme A new PKE scheme that can be tightly integrated with the SD scheme is required!!

SD + PRG

SD + HIBE

SD + ???

PK = O(log N) SK = O(log3N) CT = O(r)

PK = O(1) SK = O(log2N) CT = O(r)

log N

SK = O(log2N) CT = O(r)

SKRE of Naor et al. [NNL01]

PKRE of Dodis and Fazio [DF02]

PKRE This work 7

Introduction 

Our Approach 



A subset Si,j of the SD scheme is defined as the set of leaf nodes in Ti - Tj where Ti and Tj are two subtrees We observe that a subset Si,j of the SD scheme can be reinterpreted as an encryption scheme with single member revocation Ti Si,j = Ti - Tj

Tj

Single revoked member

Group

8

Single Revocation Encryption 

Overview 



Single revocation encryption (SRE) is a special type of public-key encryption such that a single user in a group can be revoked A ciphertext is associated with a group label GL and a (revoked) member label ML, and a user u can decrypt it if (u  GL) and (u  ML)

GL = group label ML = member label

CT(GL,ML)

one revoked member 9

Single Revocation Encryption 

Definition 



SRE is a special type of broadcast encryption with the single member revocation property An SRE scheme consists of algorithms: Setup, GenKey, Encrypt, and Decrypt Setup(-)

Setup(1,U)

GenKey(-)

 MK,PK

SK Decrypt(-)

GenKey((GL,ML),MK,PK)  SK(GL,ML) Encrypt((GL,ML),M,PK)  CT(GL,ML) CT

Decrypt(CT(GL,ML),SK(GL’,ML’),PK)  M Encrypt(-)

10

Single Revocation Encryption 

Design Principle 



Our SRE scheme is inspired by the IBRE scheme of Lewko, Sahai, and Waters that employs the two equation technique To support groups, we modify a simple variation of the IBRE scheme by using two (random oracle) hash functions group 1

group 3

group 2

SK  [ g  wr , (hwID )r , g  r ] IBRE

SK  [ g  H (GL)r , ( H (GL) H (GL) ML )r , g  r ] SRE 11

Single Revocation Encryption 

Construction 

Let (p, G, GT, e) be a bilinear group of prime order and U = {(GLi, {MLj})} be the universe of groups and members

PK  [( p, G, GT , e), g , H1 , H 2 ,   e( g , g ) ]

SK(GL, ML)  [ K0  g H 2 (GL)r , K1  ( H1 (GL) H2 (GL)ML )r , K2  g r ] CT(GL, ML)  [C0  t M , C1  g t , C2  ( H1 (GL) H 2 (GL)ML )t ] if (GL  GL)  ( ML  ML), then (e(C1 , K1 )  e(C2 , K 2 ))1 ( ML ML ) M  C0  e(C1 , K 0 )

12

Single Revocation Encryption 

Security Model 

The security of SRE is defined as an indistinguishability game between a challenger C and an attacker A PK

(GLi, MLi) SKi

b  {0,1} CT* = Encrypt(-,M*b)

(GL*, ML*), M*0, M*1 CT*

(GLi  GL*) or ((GLi = GL*)  (MLi = ML*))

b’ Challenger

Adversary 13

Single Revocation Encryption 

Security Analysis 

The proof uses the partitioning strategy and the power of q-Type assumption to simulate the queries of private keys

Private keys cannot be generated

GL1

ML* GL2

Private keys can be generated

GL*

GL3 14

Revocation Encryption 

Definition 



PKRE is a slight variant of PKBE such that a ciphertext is specified by a revoke set R instead of a receiver set S A PKRE scheme for the set N of users consists of algorithms: Setup, GenKey, Encrypt, and Decrypt Setup(-)

GenKey(-)

Setup(1,N)  MK,PK

SKu Decrypt(-)

GenKey(u,MK,PK)  SKu Encrypt(R,M,PK)  CTR Decrypt(CTR,SKu,PK)  M

CTR Encrypt(-)

15

Revocation Encryption 

Design Principle 



The basic idea of our PKRE scheme is to combine the SD scheme and our SRE scheme We observe that a subset Si,j in the SD scheme can be easily mapped to the group and member labels (GL, ML) of the SRE scheme

Group = (

||2)

Revoked member =

SRE 

16

Revocation Encryption 

Construction 

MK, PK  Setup (1, N): It implicitly sets a full binary tree  and obtains MKSRE, PKSRE of the SRE scheme



SRE.Setup(-)

MK = MKSRE, PK = (, PKSRE)

17

Revocation Encryption 

Construction 

SKu  GenKey(u, MK, PK): The private key consists of SRE private keys that are associated with subsets {Si,j} obtained from path nodes of a user

L0

SD.Assign(-)

(L0,L1)

(L0,L4)

(L1,L4)

L1

(L0,L10)

(L1,L10)

(L4,L10)

L4 For each subset, SRE.GenKey(-) L10

SKu = { SKSRE,Si,j } 18

Revocation Encryption 

Construction 

CTR  Encrypt(R, M, PK): The ciphertext consists of SRE ciphertexts associated with minimal covering subsets

(L0,L5) L0

SD.Cover(-)

For each subset, SRE.Encrypt(-) L5

CTR = { CTSRE,Si,j } X

X 19

Revocation Encryption 

Construction 

M  Decrypt(CTR, SKu, PK): If uR, the decryption algorithm of SRE can be used since there exist two subsets Si,j and S’i’,j’ such that i=i’ and jj’

Non-revoked member (from SK) Revoked member (from CT)

SRE.Decrypt(-)

X

X 20

Revocation Encryption 

Security Model 

The security of PKRE is defined as an indistinguishability game between a challenger C and an attacker A PK

ui SKi

b  {0,1} CT* = Encrypt(R*,M*b)

R*, M*0, M*1 CT*

ui  R*

b’ Challenger

Adversary 21

Revocation Encryption 

Security Analysis 



The proof uses hybrid games that convert the challenge ciphertext from an encryption of M*0 to an encryption of M*1 Let the size of covering subsets of the challenge revoked set R* is w

CT* =

CTSRE,1

CTSRE,2

CTSRE,3

G0 =

M*0

M*0

M*0 SRE security

G1 =

M*1

M*0

M*0 SRE security

G2 =

M*1

M*1

M*0 SRE security

G3 =

M*1

M*1

M*1 22

Revocation Encryption 

Discussions 







Efficiency: In our PKRE scheme, a public key, a private key, and a ciphertext consists of O(1), O(log2N), O(r) group elements, respectively Layered Subset Difference: If the LSD scheme is used, then the group elements of a private key can be reduced from O(log2N) to O(log1.5N) Chosen-Ciphertext Security: A CCA-secure PKRE scheme can be constructed by combining a CCA-secure SRE scheme with an one-time signature (OTS) scheme Trace and Revoke: Our PKRE scheme provides the tracing property since it is derived from the subset cover framework of Naor et al., but it can only trace to a subset pattern in some colluding scenarios

23

Thank You

24

Public-Key Revocation and Tracing Schemes with ... - ESORICS 2014

from subset difference (SD) methods to reduce the size of private keys ... We present an efficient PKRE scheme with shorter private keys and .... is associated with a group label GL and a (revoked) member label ML, and a user u can decrypt it if (u ∈ GL) and (u ≠ ML). 9. CT(GL,ML). GL = group label. ML = member label.

776KB Sizes 0 Downloads 106 Views

Recommend Documents

Scalable Group Signatures with Revocation - Research at Google
For a digital signature scheme to be adopted, an efficient ... membership revocation remains a non-trivial problem in group signatures: all existing solutions are ...

Color Schemes
Name. Period ______. Color Schemes. Define Color Scheme: 1. The first color schemes is: Definition: Examples of colors: 2. The second color scheme is:.

accurate streamline tracing and coverage
Difference approach to see if we can recover more accurate Darcy fluxes and hence improve the tracing of ...... interpolation of the nearest streamline data points. ..... proceedings of SPE Reservoir Simulation Symposium, Houston, TX, USA.

ePub Letter Tracing For Boys: Letter Tracing Book ...
Pen Control Age 3-5 Wipe Clean Activity Book (Collins Easy Learning Preschool) · Writing Workbook Ages 3-5: New Edition (Collins Easy Learning Preschool).

An Efficient and Secure User Revocation Scheme in ...
a set of custom simulations built in Java. In the following, we detail .... fine-grained data access control in cloud computing,” in INFOCOM,. 2010, pp. 534–542.

Scams and Schemes Activity Sheet.pdf
Scams and Schemes Activity Sheet.pdf. Scams and Schemes Activity Sheet.pdf. Open. Extract. Open with. Sign In. Main menu.

Interactive Ray Tracing of Arbitrary Implicits with SIMD ...
on common laptop hardware, with a system that accurately visual- izes any implicit surface .... domains [4, 9], and ray tracing algorithms involving recursive in-.

Voxel Cone Tracing - GitHub
performed on a Pentium 4 computer with 2.7 Ghz clocking, Linux Mint 17. Qiana (32 bit) and 2 GB of primary memory. The GPU ..... pdf. [Lot09]. T Lottes. FXAA (Whitepaper). Tech. rep. NVIDIA, 2009. url: ... Apple Inc., 2013. [Mil94]. Gavin Miller.

Download OSCE Cases with Mark Schemes: A ...
... A Revision Aid for. Medical Finals Online eBook ... Explanation of Management and Results SECTION TWO, ... Anesthesia Cardiology. Dermatology Hospital.