Cryptography Reference
In-Depth Information
Fig. 2.12. A graphical depiction of the subset difference key poset for 8 users.
where the concatenated string LR has a length at most log n. We refer reader
to the Figure 2.13 for the computational specification of Subset Difference in
the KP framework.
The key-forest for compression.
Consider the set of trees of the following form : let L ∈{0,1} x with 0 ≤ x ≤
log n − 1 and b ∈ {0,1}. We have that F Lb is a binary tree constructed as
follows: it includes as root the node that corresponds to the subset j where
j = (L,b). In addition, F Lb includes all the nodes that can be added recursively
following this rule : for any node j 0 in F Lb , the first child of j 0 is cvr(j 0 ,2) and the
second child of j 0 is cvr(j 0 ,3) (see Figure 2.13 for computational specification
of the Subset Difference). The subset encoded by that contains the whole
user population also forms a tree by itself as a single node that is denoted by
F ε . The family of trees is denoted by F SD .
Proposition 2.41. The set F SD = {F s | s ∈ {0,1} x ,x = 0,..., log n} is a
key-forest of the set system Φ SD with degree 3.
Proof. Due to the definition of F Lb for any L ∈{0,1} x with 0 ≤ x ≤ log n−1
and b ∈{0,1}, it is easy to observe that the tree edges follow the superset rela-
tion, i.e. it holds that a parent of a node is a subset of that node. Now consider
any four nodes in the tree F Lb denoted by (L 1 ,R 1 ), (L 2 ,R 2 ), (L 3 ,R 3 ), (L 4 ,R 4 )
for which it holds that R 1 is a prefix of R 2 ,R 3 and R 2 ,R 3 are both prefixes of
R 4 . While this condition is necessary for a cycle (albeit not su cient) it also
suggests that R 2 ,R 3 must satisfy that one is a prefix of the other and thus
the four nodes cannot be in a cycle.
 
Search WWH ::




Custom Search