Cryptography Reference
In-Depth Information
Definition 2.3. Consider a family of subsets Φ = {S j } j∈J defined over
[n] where J denotes the set of encodings for the elements in Φ over an al-
phabet Σ with length of at most l(n) for some length function l(·). We say
Φ is (n,r,t)-exclusive if for any subset R ⊆ [n] with |R| ≤ r, we can write
[n] \R = ∪ i=1 S j i where s ≤ t and S j i ∈ Φ for 1 ≤ i ≤ s.
Having defined exclusive-set systems, we will now give a construction for
broadcast encryption schemes based on exclusive-set systems. We note that
the recovery of j 1 ,..., j s given R should be done e ciently for a system to
be useful. For this reason when one proposes a set system it is imperative
to include a description of how the covering algorithm would work (that is
at the heart of the revocation algorithm). The goal of this algorithm would
be to produce the indices j i , i = 1,...,s of the subsets that cover the set of
enabled users [n] \R. A trivial covering algorithm for revocation that works
with any set system would be to search for the pattern in a brute force manner.
Given that in an exclusive set system the target pattern is postulated to exist,
the exhaustive search algorithm is guaranteed to find a solution. Nevertheless
this will not lead to an e cient implementation for any but entirely trivial
set systems. In the rest of the chapter we will be concerned with the design of
exclusive set systems with e cient revocation algorithms and in fact we will
present a generic revocation algorithm given any set system that satisfies a
simple algebraic property.
In Figure 2.2 we present a template for a broadcast encryption system
based on exclusive set systems. We assume a family of exclusive set systems
indexed by n as well as an underlying symmetric encryption scheme ( E , D )
that uses as keys elements of K.
The characteristics of the scheme given in figure 2.2 that make it a template
are as follows:
1. The exclusive set system Φ is not explicitly specified but used in a black-
box fashion. It is assumed that an exclusive set system can be found for
any number of users n. To specify this we may use the notation {Φ n } n∈ N
to denote the collection of exclusive set systems produced for each number
of users n, or simply write Φ overloading the set-system notation (in such
case there an implicit reference to the number of users n will be assumed).
2. The exact mechanism that KeyGen uses to sample the keys {k j } j∈J is
not specified. The only restriction is that each key belongs to the set K.
3. The underlying encryption scheme ( E , D ) is not specified but used in a
black box fashion.
Comments on the Template Construction.
For any exclusive set system Φ and an encryption scheme ( E , D ) we can instan-
tiate the template of Figure 2.2 by having the KeyGen procedure sample the
keys {k j } j∈J independently at random from the set of keys for the encryption
scheme ( E , D ). We will refer to this scheme as : BE basic . As we will see later
Search WWH ::




Custom Search