The invention relates to the field of broadcast communication networks. Specifically the invention relates to the field of broadcast encryption with both temporary and permanent revocation capability.
In broadcast encryption a single broadcaster can send encrypted messages to a group of users so that only authorized users can decrypt the messages. Such message may be for example, a secret key for decrypting content, such as a movie, which should be available for decryption only for subscribers (users) who paid a required fee to the content provider. Since the introduction of broadcast encryption there has been a great deal of work on extending the framework of broadcast encryption, thereby improving its security and optimizing its performance.
One of the factors driving interest in broadcast encryption is its commercial importance in content distribution, e.g. television networks. Historically, such networks were developed and administered by a single broadcaster who distributed both content and keys to registered users. In this setting, symmetric-key encryption is normally used, in which the broadcaster holds all the keys of the receivers.
A more flexible system allows separating between the key distribution and content distribution functions. In this setting, a single key manager generates and distributes keys to all users (subscribers), but multiple content providers can directly send encrypted content to users. The benefits of such an approach include lower barriers of entry for both key providers and content providers and potentially greater choice and lower cost for users. However, the separation of functions typically rules out symmetric-key encryption since the key manager would not want to share all the system's keys with a content provider.
Public-key broadcast encryption solves this problem by separating the keys into a public key and secret keys. The public key allows a content provider to encrypt content and the secret keys allow each authorized user to decrypt content.
Broadcast encryption schemes differ in the way that they determine authorized users. Upon joining the system (e.g., during a registration stage), a user is authorized to receive a subset of the distributed content (for example, a package of sports channels). This authorization is enforced by the keys that the key manager provides to the user. The key manager can decide to expand the subset of the content for which the user is authorized by providing additional keys. However, reducing the user's authorization or completely revoking that authorization requires a revocation procedure that invalidates the user's decryption keys.
Revocation in broadcast encryption schemes can generally be divided into two types, temporary revocation and permanent revocation. Typical revocation schemes for broadcast encryption are limited either to temporary revocation only or to permanent revocation only, often without explicitly stating the difference. However, in practice, both types of revocation are important.
Temporary Revocation
In temporary revocation, authorization is attached to a specific encrypted message and therefore revoking a user does not extend to subsequent messages. When using temporary revocation, the broadcaster must know which user will be able to decrypt the transmitted content and which user will not, and encrypt the content accordingly. Temporary revocation is required for example, when a user wishes to remain a subscriber, but does not want to receive a specific content (e.g., sports channels). In this case, he will be temporary revoked and will not be able to decrypt messages that are related to sports channels. However, a revoked user is temporarily revoked in each message and the public key that is used for encryption must contain the information who will and who will not be able to decrypt and therefore, when more and more users are revoked or authorized, the encryption (public) key becomes larger and larger. Also, temporary revocation approach suffers from two drawbacks. The first drawback is performance penalty, since the complexity of sending a message keeps growing as a function of historical revocations. The other drawback is that when the roles of key management and content distribution are separate, it may not be possible for a broadcaster to keep track of every revoked user. In addition, temporary revocation requires maintaining long lists of subscribers, which introduce substantial overhead both during encryption and decryption, as well as security problems (since these lists may leak is adversaries get access to them).
Permanent Revocation
In permanent revocation, the key manager revokes the authorization of a user, thereby preventing him from decrypting future messages (it is practically equivalent to taking back hardware from the user, such as his set-top box).
Permanent revocation may be the consequence of a user canceling his subscription and is therefore, a common feature of real-world broadcast encryption systems. A motivating example for temporary revocation is when a content provider distributes an encryption key for some premium content (e.g., a televised pay-per-view event), only to users who paid for the content. Subsequently, the content is broadcasted to all users in the system, but only the users who received the content key can decrypt it. In encryption schemes that use permanent revocation, the public key that is used for encryption is independent of the number of users (subscribers) which should be revoked. Also, each time a broadcaster starts encrypting a new content (e.g., a movie), encryption is made with respect to a current state. When a broadcaster wishes to determine which user will remain a subscriber and who will be revoked (e.g., if he stopped paying the required subscription fee), he can send a message containing state parameters to all users and as a result, only users that paid the fee will be able to update their state and remain subscribers and all the others will be revoked. This message is sent to all users every time the broadcaster wishes to revoke users. In order to remain a subscriber, upon receiving the message, each user must update his state. This way, all users that stopped paying the required subscription fee will be permanently revoked and will not be able to decrypt the message or any subsequent messages (unless performing the required registration process, like any new subscriber).
The security of broadcast encryption can be loosely defined as the property of non-authorized users being unable to decrypt ciphertexts and can be typically reduced to the security of a cryptographic primitive. Security definitions for broadcast security, differ in modeling the adversary. One feature of the adversary model is the number of users that the adversary may corrupt. Most broadcast encryption schemes assume that the adversary can control multiple users (possibly, an unbounded number of them) and therefore, require collusion resistance (i.e. require that even a coalition of unauthorized users working together cannot decrypt ciphertexts). A second feature determines whether the adversary (and the associated security proof) is adaptive or is only selective. An adaptive adversary decides dynamically which users to corrupt while in the selective setting the adversary selects the set of corrupted users before the key manager sets system parameters.
The performance of broadcast encryption is measured by the size of the objects in the system and the time required to perform the algorithms in the scheme as a function of the n users in the system and the number of revoked users. The measured objects include encryption and decryption keys, ciphertext length and messages for user revocation, which are part of the ciphertext in the case of temporary revocation and are separate from the ciphertext, for permanent revocation.
The performance of different broadcast encryption schemes is sometimes difficult to compare because each optimizes different measures. For example, the simplest broadcast encryption scheme involves encrypting a plaintext message separately with each authorized user's symmetric/public key. In this scheme, the encryption key, ciphertext length and time to perform encryption are O(n−r) for n users in the system and r revoked users. However, all other measures are O(1) and revocation is especially trivial for all users actually requiring less work for the key manager and broadcaster.
Important broadcasting parameters in these broadcasting schemes are the size of the public key that is used for encryption, the size of the secret key used for decryption and the size of the content. It is desired that encryption will require as less data traffic, as possible.
WO 2013/027206 discloses a method for broadcast encryption that allows a broadcaster to send encrypted data to a set of users such that only a subset of authorized users can decrypt said data. The method comprises modifications to the four stages of the basic Cipher-text Policy Attribute-Based Encryption techniques. It then claimed that the method can be adapted to transform any Attribute-Based Encryption scheme that supports only temporary revocation into a scheme that supports the permanent revocation of users.
According to this method, a part of each decryption key will be dynamic and each time a message is sent to a user, the key is updated, such that only users that should not be permanently revoked will be able to update his state (the broadcaster sends to each user a private key that includes the attributes of the user and a component that includes the state of the user, which is a function of a random control component that is frequently updated from the moment that the user completed a registration process and became a subscriber).
Another problem with the method proposed by WO 2013/027206 is related to security, since there may be collusion between an authorized subscriber who received the secret key for decryption (who is able to update his state) and a revoked subscriber. In this case, the revoked subscriber can learn from the authorized subscriber what should be the new updated state and continue decrypting, like he has been never revoked.
It is clear that permanent revocation alone is not sufficient, since there are situations when a broadcaster wishes to revoke a user just temporarily. Therefore, both types of revocations are required.
It is therefore an object of the present invention to provide a broadcast encryption scheme that overcomes the drawbacks of typical revocation schemes for broadcast encryption.
It is another object of the present invention to provide a broadcast encryption scheme that enables both temporary and permanent revocation, while keeping performance that is as good as broadcast encryption systems that achieve either temporary revocation or permanent revocation, separately.
It is another object of the present invention to provide a broadcast encryption scheme that enables both temporary and permanent revocation but prevent revoked users from decrypting messages, even in case of collusion between revoked users and users who can decrypt.
Other objects and advantages of the invention will become apparent as the description proceeds.
A broadcast encryption method that allows a broadcaster to send encrypted content to a set of users such that only a subset of authorized users can decrypt the content, and to perform both temporary and permanent revocation of users, comprising the following steps:
Permanent revocation of specific attributes of users may be done directly in the revocation mechanism, without the need of providing new secret keys.
A broadcast encryption system that allows a broadcaster to send encrypted content to a set of users such that only a subset of authorized users can decrypt the content, and to perform both temporary and permanent revocation of users, which comprises:
In one aspect, the KeyService may operate separately from the broadcaster, and performs one or more of the following:
In the drawings:
Reference will now be made to an embodiment of the present invention, examples of which are provided in the accompanying figures for purposes of illustration only. One skilled in the art will readily recognize from the following description that alternative embodiments of the structures and methods exemplified herein may be employed, mutatis mutandis, without departing from the principles of the invention.
The invention proposes a broadcast encryption scheme, bases on public-key that enables both temporary and permanent revocation with performance that in every measure is as good as broadcast encryption systems that achieve either temporary revocation or permanent revocation separately.
At a high level, a broadcast encryption scheme with temporary and permanent revocation is defined as a protocol between a key manager, n receivers (or users) and an unbounded number of broadcasters. In some embodiments, the protocol includes six steps, each implemented with an algorithm: setup, key generation, encryption, decryption, (permanent) revocation and key update.
The proposed scheme may incorporate Cipher-text Policy Attribute-Based Encryption (CP-ABE—where a user has to possess a certain set of attributes in order to access data) techniques, to achieve temporary revocation. Registration of a user is done with predetermined attributes, which may be, for example, (1) a sports package and (2) watching time between 8:00 am to 2:00 pm, (3) gender and (4) age. Upon registration, these attributes may be part of the encryption, since the broadcaster may generate a formula (some logic function) from the attributes and the public encryption key will include the formula. This way, for example, only users that belong to a group of men in the age of 40-42 which are subscribers of sports package that is broadcasted between 8:00 am to 2:00 pm will be able to decrypt the message.
It is also possible to use Key Policy Attribute Based Encryption (KP-ABE) scheme. In this scheme, data is associated with the attributes for which a public key is defined for each. A broadcaster, who encrypts the data, is associated with the set of attributes to the data or message by encrypting it with a public key). In this scheme, the broadcaster encrypts with the attributes without the formula, while the decryption keys have the formula.
In one embodiment, ABE schemes may further include permanent revocation, which is directed to subscribers. For example, a user who stopped paying for the subscription will not be able to decrypt following massages, regardless its attributes.
In another embodiment, the ABE schemes may further include permanent revocation, which is directed only to specific attributes of users. This may be done by totally revoking their ability to decrypt and to provide him with a new secret key, which will allow him to decrypt messages that do not correspond to these specific attributes.
In another embodiment, the abovementioned functionality, permanent revocation of users' specific attributes can be done directly in the revocation mechanism without the need of providing new secret keys.
Description of the Revocation Process
The key manager runs a setup stage to generate system parameters including a Master Secret Key (MSK), which he retains, and a public key which is published. The key manager also performs key generation to create a secret key for each user in the system. It is assumed that a user receives the secret key in a secure, out-of-band method, e.g. by establishing a Virtual Private Network (VPN) between the key manager and the user.
A broadcaster executes the encryption algorithm which takes a set of temporarily revoked users as one of its parameters and outputs a ciphertext. A user can decrypt this ciphertext if and only if it is not one of the temporarily revoked users. The key manager performs the revocation algorithm which enables each of the non-revoked users to run key update and derive new secret keys. The revoked users will not be able to update their keys and will be unable to decrypt any ciphertexts in the future. However, it is always possible for a user to go through the key generation process again, receiving fresh keys.
The proposed scheme combines attributes from public-key temporary revocation systems and symmetric-key permanent revocation systems. A possible approach is to merge the two system types together in the sense of having each user hold independent keys for each system. The broadcaster secret shares each message and encrypts one share with the temporary revocation system and the other share with the permanent revocation system. Then a legitimate user can decrypt both shares and a revoked user will be unable to decrypt. However, this approach is not sufficiently secure when considering collusion between users who are only temporarily revoked and users who are only permanently revoked.
As an alternative to merging, the disclosed system merges the keys of the two schemes and modifies the six algorithms appropriately, to ensure correctness. It is proved that the construction is secure based on a two-step hybrid argument. The first step relies on the hardness of a novel computational problem which is formalized as the Mixed Exponent Assumption (MEA) and the second step is secure in the generic bilinear group model (disclosed, for example, in WO 2013/027206).
In this model (which is an idealized cryptographic model), an adversary can gain access only to random encoding of a group. The model includes an oracle (a virtual machine which is able to solve certain decision problems in a single operation) that executes the group operation and takes two encodings of group elements as input and outputs an encoding of a third element.
MEA is similar to discrete-log based hardness assumptions in that its input includes powers of a generator g of a group G with prime order p. The group elements in MEA (as in other hardness assumptions) are not independently chosen. There are correlations between the exponents of different group elements. Unlike other assumptions, the input of MEA also includes functions of these exponents directly in Zp. Intuitively, any combination of the elements in G and the elements in Zp is indistinguishable from a random element. In more detail, MEA states that the following problem is computationally hard.
Let Y∈Zpm be a vector of secrets, let V, U∈Zpn, let A be a n×m matrix, let F be a sequence of k multivariate polynomials over Y and let H∈Gk. Then, it is hard to distinguish between the pairs (V,H) and (U,H) if:
The MEA assumption is in fact a family of assumptions indexed by a matrix and a sequence of functions. A specific member of this family with matrix A and sequence of functions F is referred as (A,F)-MEA.
The public key and each secret key are of size O(1) group elements. A ciphertext which determines the temporary revocation of r users is of length O(r) group elements and the time complexity of both encryption and decryption is O(r). Similarly, the output of the revocation algorithm, which is used for permanent revocation of r′ users is of length O(r′) and the time complexity of both the revocation and key update algorithms are O(r′).
The disclosed construction benefits performance that enables many commercial applications. One such application can be a platform for broadcasting live events, such as sports matches and concerts. Usually, content providers of such events make their profit (content, not merchandise wise) by selling tickets and recorded videos of the events. With the proposed scheme, they can also make profit by broadcasting the events in real-time and thus reach clients that are unable to attend the events (there are many reasons for that e.g., sold out or too expensive tickets, geographic distance and more). Furthermore, it may help individuals who are unable to attend such events, to enjoy the experience of watching them live at reasonable prices. Another possibility is for content providers to sell the broadcast rights to hang-out venues such as bars and restaurants that may then offer their clients a richer experience and attract more clients.
According to an embodiment of the present disclosure, a revocation scheme that supports both temporary and permanent revocations consists of six algorithms: Setup, KeyGen, Revoke, UpdateKey, Encrypt and Decrypt.
Revocation Systems
In some embodiments, both temporary and permanent revocation schemes consist of six algorithms representing six steps of the scheme: Setup, Key Generation, Revoke, Update Key, Encrypt and Decrypt.
Setup(λ) stage: The Setup algorithm input is a security parameter λ. The setup algorithm chooses a 3-linear group G of prime order p for >2λ. It then chooses random generators g,w,h∈G and random exponents s,α,b,xsb,xαs1,xα12,,{circumflex over (x)}∈Zp. The outputs of the algorithm are the Public Parameters (PP), and the master secret key (MSK), as follows:
MSK=(s,α,b,xsb,xαs1,xαs2,,{circumflex over (x)}∈Zp,w∈G)
KeyGen(MSK,ID) stage: Given a user identity ID∈Zp and the master secret key MSK, the algorithm chooses random t∈Zp. It then sets
The output of this algorithm is SKID={D1,D2,D3,S1,S2}.
Revoke(S,PP,MSK) stage: Given a set S of r identities to revoke, the algorithm chooses random s1′, . . . sr′∈Zp, sets s′=s1′+ . . . +sr′, and then for each identity IDi∈S it sets the following variables:
S1,ID
The algorithm then:
1. Updates the master secret key by replacing s+S′;
2. Updates the public parameters by replacing
respectively;
3. Broadcast the state update message SUM={S1,ID
UpdateKey(SKID,SUM,ID) stage: Given a state update message SUM, the algorithm updates the secrety key SKID. It first checks if ID∈Ui=ir S3,ID
Finally it updates SKID by setting S1=S1·S1′ and S2=S2·S2′.
Encrypt(S,PP,M) stage: This algorithm takes as input a set S of identities to revoke, the public parameters PP and a message M∈GT. The algorithm first chooses a random exponent x∈Zp. Next the algorithm sets:
The output of the Encrypt algorithm is the ciphertext CT={CO,C1,C2}
Decrypt(SKID,CT,PP) stage: This algorithm is given a secret key SKID, a ciphertext CT and the public parameters PP. If SKID·revoked=true or ID is in the set of revoked users that correspond to CT, the algorithm outputs ⊥. Otherwise the algorithm begins with calculating A:
Finally the Decrypt algorithm calculates M:
The system is required to satisfy the following correctness and security properties:
Correctness:
For all messages M, sets of identities S,S1, . . . Sn, and all ID∉Ui=1n(SiUS),
The security of a permanent revocation scheme is defined as a game between a challenger and an attack algorithm with the following phases:
Setup
The challenger runs the Setup algorithm with security parameter λ to obtain the Public Parameters PP and the Master Secret Key MSK. It maintains a set of identities initialized to the empty set and then sends PP to .
Key Query and Revocation
In this phase adaptively issues secret key and revocation queries. For every private key query for identity ID, the challenger adds ID to Q, runs KeyGen(MSK,ID)→SKID and sends to the corresponding secret key SKID. For every revocation query for a set S of Identities, the challenger updates Q←Q\S, runs Revoke(S,PP,MSK)→(MSK′,PP′,SUM), replaces (MSK,PP) with (MSK′,PP′) and sends to the new PP and the corresponding key update messages SUM.
Challenge
sends to the challenger a set S of identities and two messages M1, M2. In case S the challenger sends ⊥ to and aborts. Otherwise, the challenger flips a random coin ∈{0,1}, runs the Encrypt(S,PP,Mb) algorithm to obtain an encryption of Mb and sends it to .
Guess
outputs a guess b′∈{0,1} and wins if b=b′.
The advantage has in the security game for a permanent revocation scheme with security parameter λ is defined as Ad=|Pr[ wins]−½|.
A permanent revocation scheme is adaptively secure if for all poly-time algorithms , Ad=negl(λ).
Selective security is defined similarly, except that the revoked sets of identities are declared by the adversary before it sees the public parameters in an Init phase.
Bilinear Maps
For groups G, GT of the same prime order p, a bilinear map e: G2→GT satisfies:
G is called a (symmetric) bilinear group and GT is called the target group.
Pseudo-Random Functions (PRFs)
Intuitively, a family of Pseudo-Random Functions is a family of functions such that a randomly chosen member of the family cannot be efficiently distinguished from a truly random function by an algorithm that observes the function's output. The following definition states the requirements of a PRF more precisely for the disclosed systems:
Let (Aλ,Bλ)λ∈N be a sequence of pairs of domains and let F={Fλ}λ∈N be a function ensemble such that the random variable Fλ assumes values in the set of Aλ→Bλ functions. Then F is a PRF ensemble if:
PRF function families can be efficiently constructed for many useful domains Aλ, Bλ including the groups Zn=Z/nZ for any integer n. It is noted that in practice a PRF family can be instantiated by a block cipher such as AES where each function in the family corresponds to a cipher key.
Decisional MEA-Assumption
Let G be a group of primt order p with generator g, let A∈Zpn×m be a matrix and for a vector of formal variables X=(X1, . . . , Xm) define a vector Y=(Y1, . . . Yn) by AX=Y. Let F=(f1, . . . fk)∈Zp[Xi, . . . Xm]k be a k-tuple of m-variate poynomials such that for any degree two, k-variate polynomial p and for any k polynomials ϕ1, . . . ϕk∈Zp[Yi . . . Yn]k the polynomial p(ϕ1(Y)f1(X), . . . ϕk(Y)fk(X)) is not identically zero.
The decisional (A,F)-Mixed exponent problem in G is to distinguish between the distributions on the tuples (g,y,h) and (g,u,h) which are defined as follow. Choose a random x=(x1, . . . xm)∈Zpm, compute y=A·x and h=(h1, . . . hk) such that (hi=gf
An algorithm that outputs ∈{0,1} has advantage ϵ in solving the Decisional (A,F)-MEA-problem in G if |Pr[(g,A,F,y,h)=1]−Pr[(g,A,F,u,h)=1]|≥ϵ.
The Decisional (A,F)-Mixed Exponent Assumption ((A,F)-MEA) holds if any poly-time algorithm has a negligible advantage in solving the Decisional (A,F)-MEA-problem. The MEA family of assumptions is the set of all (A,F)-MEA-assumptions.
Public Key Revocation Scheme
Setup(λ) stage: The setup algorithm, given a security parameter λ, chooses a bilinear group G of prime order p such that |p|≥λ. It then chooses random generators g,w∈G, random exponents α,γ,b∈Zp and sets ST=1. Finally, the setup algorithm randomly chooses a function ϕ8 from Fλ, a pseudo-random family of permutations over Zp. The Master secret key MSK is MSK=(α,b,γ,w,ST,ϕ)), and the public parameters PP are PP=(g,gbST,gb
KeyGen(MSK, ID) stage: Given a user identity ID∈Zp and the master secret key MSK, the KeyGen algorithm computes t=ϕ(ID)∈Zp and sets D1=g−t,D2=(gbIDw)t,
D4=g(α+b
The output of the KeyGen algorithm is SKID={D1, . . . , D5}.
Revoke(S,PP,MSK) stage: The revoke stage, the state is changed by sending a single message that is sent to all users in parallel. This algorithm is given a set S={ID1, . . . ,IDr} of identities to revoke, the public parameters and the master secret key. The algorithm sets ST′=ST and for i=1 to r it computes:
Where ti=ϕ(IDi). The Revoke algorithm then performs the following operations:
During the UpdateKey stage follows the Revoke stage and provides indication regarding how any user updated his state after receiving a Revoke message. Some users will be able to update their state and the remaining users (which should be revoked) will not.
Given a key update message SUM for r revoked identities, the algorithm updates the secret key SKID. It first checks if D3∈Ui=1r Si,1 and if so it sets D5=true. Otherwise, it sets h0=D4. Then, for i=1 to r it sets
Finally, the algorithm updates SKID by replacing D4 with hr.
It should be noted that hr=g(α+b
Encrypt(S,PP,M) stage: During the Encrypt stage, the broadcaster who creates the content also encrypts it. The encryption algorithm takes as input the public parameters PP, a message M∈GT and a set S of revoked identities. The algorithm first lets r=|S|, chooses r random exponents s1, . . . , sr∈Zp and sets s=Σi=1r si.
Next, the algorithm sets C0=M·e(g,g)αsST, C1=gs, and for i=1 to r sets Ci,1=IDi, Ci,2=(gbST)s
The output of the algorithm is CT={CO,C1,{Ci,1,Ci,2Ci,3}i=1r}.
Decrypt(SKID,CT,PP) stage: The decryption algorithm is given a secret key SKID, a ciphertext CT and the public parameters PP. First, if D5=true or ID∈Ui=1r Ci,1 then the algorithm outputs ⊥. Otherwise the algorithm calculates:
Finally the algorithm retrieves the message:
M=C0/(A/B)
Security Analysis
By simulating a sequence of the security games against an adversary, each one indistinguishable from the next, it can be proved that the disclosed revocation scheme is generically secure over bilinear groups. The first game is the original security game. In the next game the elements correspond to D3 in the secret keys are replaced with random elements. Indistinguishably follows directly from the MEA assumption. In the next game the cipher text is changed to a random element.
Given an adversary , with non-negligible advantage ϵ=AD in the security game against the disclosed construction, a simulator is defined that plays the decisional MEA problem.
Let A=Zpn×(2n+q+4) be the following matrix:
Let (p1′, . . . , p7′)∈Fp[Y1, . . . , Ym]7 be the following polynomials:
Let F=(f1, . . . , fk)∈Fp[X1, . . . Xm]k be the following polynomials:
∀1≤i≤n fy,i=p1′(Xi+1)
∀1≤i≤n ft1,i=p2′(Xi+1,Xn+2,Xn+3)
fb=p1′(Xn+3)
fb2=p3′(Xn+3)
fwb=p4′(Xn+3,Xn+4)
∀1≤i≤n ft2,i=p5′(Xi+1,Xn+2,Xn+3,Xn+4+i,Xn+4)
ps=f6′(X2n+5, . . . ,X2n+q+4)
∀1≤i≤q fs1,i=p4′(Xn+3,X2n+4+i)
∀1≤i≤q fs2,i=p7′(Xn+3,Xn+4+i,Xn+4,X2n+4+i)
fαs=p6′(X2n+5, . . . ,X2n+q+4)p1′(Xn+2)
receives an (A,F)-MEA challenge X=(g,A,F,T,h). It then plays the original security game against the adversary. Let τ be the number of permanent revocation requests that the adversary performs. Let ρi denote the number of revoked users in the i-th request. Their identities are denoted by IDij where i is in [1, τ] and j is in [1, ρi]. Similarly, STi,j is used to denote the state after the revocation of the j-th identity in the i-th group. Let ψi denote the number of secret key requests the adversary performs after the i-th permanent revocation request (ψ0 is the number of secret key requests prior to the first revocation). the identities for which the adversary requests keys are denoted by IDk
Next, the elements that the adversary learns during the security game are written, from which a computational assumption is stated. From the public parameters and revocation requests, the adversary learns
From the secret key requests, the adversary learns
Finally, from the challenge, the adversary learns
gs,M·e(g,g)αsST
∀i∈[1,q](gBST
where
For each identity IDk
(n−q)-Decisional Multi-Exponent Assumption:
Let be a bilinear group of prime order p. For any (τ, ρ1, . . . , ρτ, ψ0, . . . , ψτ) such that Σk=0τγk=n and Σi=0ρi=n−q the (n−q)-Decisional Multi-Exponent problem in is as follows:
A challenger chooses generators g, w∈ and random exponents,b,γ,{tk
such that
Then it must be hard to distinguish
from a random element R∈T. An algorithm that outputs z∈{0,1} has advantage ϵ in solving the (n−q)-Decisional Multi-Exponent problem in g if
The decision (n−q)-Decisional Multi-Exponent Assumption holds if no poly-time algorithm has a non-negligible advantage in solving the (n−q)-Decisional Multi-Exponent problem.
In the second game, uses the (A,F)-MEA challenge to simulate the security game. The random exponents chosen by the (A,F)-MEA challenger are denoted by
can use h to simulate all the needed group elements since
taeks D3 elements from T. If T=A×e these elements have the same distribution as in the real security game since
It follows that the simulation provided by is perfect unless T is a random element in Zpn. Assuming the MEA holds, cannot distinguish between the games.
According to one embodiment, the proposed revocation system (which supports both temporary and permanent revocation) may be separated from the broadcasting system (unlike the previous embodiments, in which the keys were part of the broadcasted content). For example, the broadcaster may encrypt the content with a public key and each user will be able to purchase the secret key from a 3rd party (such as PayPal), to thereby become a subscriber. In this embodiment, the 3rd party will handle all payment issues. The broadcasting system will use the payment data for maintaining users that paid (subscribers) and for updating keys for both revocations.
When the broadcaster wishes to send the public key (in the form of a message M, with which he encrypted the content) to all users (subscribers), he uses the Public Parameters PP to create the message M and further creates a CipherText (CT), which is sent to all users. When a user wishes to decrypt the content he received, he sends a request with his ID1 (RequestID1) to the KeyService, which by the KeyGen stage, generates a corresponding secret key SKID1. The secret key SKID1 is sent to the user ID1 via a secure channel. Then the user performs a Decrypt operation using secret key SKID1, decrypt the CipherText (CT) and obtain the message M.
If temporary revocation is desired, it is possible to insert a list of IDs (ID1, ID2, . . . IDk), to be revoked into the CT. This way, the same flow may be used for performing temporary revocation, as well.
The proposed scheme used by the broadcasting system has the following advantages over other schemes:
The proposed scheme is more secure, since in case of collusion between revoked users, they will not be able to decrypt. In case of collusion between revoked users and users who can decrypt, at most, they will be able to decrypt the current specific massage but not future messages, as it will require performing successful state update. It is also more efficient, since it does not require using 3-linear groups and can be performed using bi-linear groups.
The KeyService may operate separately from the broadcaster, to handle key generation, distribution, update, as well has to handle all billing issues and payment of subscribers. For example, the KeyService may generate and distribute Keys both to the broadcaster and to users who became subscribers, according to their attributes;
Although embodiments of the invention have been described by way of illustration, it will be understood that the invention may be carried out with many variations, modifications, and adaptations, without exceeding the scope of the claims.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IL2018/050510 | 5/10/2018 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2018/207187 | 11/15/2018 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
6397329 | Aiello | May 2002 | B1 |
20080298582 | Sakai | Dec 2008 | A1 |
20090138704 | Delerablee | May 2009 | A1 |
20120257756 | Huang et al. | Oct 2012 | A1 |
20130308776 | Delerablee et al. | Nov 2013 | A1 |
20140226816 | Dolev et al. | Aug 2014 | A1 |
20170359315 | Zhang | Dec 2017 | A1 |
Number | Date | Country |
---|---|---|
2013027206 | Feb 2013 | WO |
2016189105 | Dec 2016 | WO |
Entry |
---|
International Search Report for PCT/IL2018/050510, dated Jul. 30, 2018, 4 pages. |
Written Opinion of the International Searching Authority for PCT/IL2018/050510, dated Jul. 30, 2018, 5 pages. |
Pascal Junod et al., “An efficient public-key attribute-based broadcase encryption scheme allowing arbitrary access policies” 10th Annual ACM Workshop on Digital Rights Management 2010, Oct. 4, 2010), 13 pages. |
Hartono Kumio et al., “Efficient Revocation Schemes for Secure Multicase” Dec. 31, 2001, 21 pages. |
Number | Date | Country | |
---|---|---|---|
20200186347 A1 | Jun 2020 | US |
Number | Date | Country | |
---|---|---|---|
62503696 | May 2017 | US | |
62544936 | Aug 2017 | US |