Method and system for performing broadcast encryption with revocation capability

Information

  • Patent Grant
  • 11251954
  • Patent Number
    11,251,954
  • Date Filed
    Thursday, May 10, 2018
    6 years ago
  • Date Issued
    Tuesday, February 15, 2022
    2 years ago
Abstract
A broadcast encryption method that allows a broadcaster to send encrypted content to a set of users such that only a subset of authorized users can decrypt the content, and to perform both temporary and permanent revocation of users. Accordingly, during a Setup stage, a Key Service generates a public key and a Master Secret Key (MSK) and sends the Public Parameters PP used to generate the public key to a broadcaster and to all users. The broadcaster uses the Public Parameters PP to create a message M, with which the broadcaster encrypts the content, and further creates a Cipher Text (CT), which is sent to all users. During a Key Gen stage, whenever a user wishes to decrypt the message M for decrypting the content, the user sends a request with his ID1 to the Key Service. The Key Service generates a corresponding secret key SKID1 and the secret key SKID1 is sent to the user ID1 via a secure data channel. During a Decrypt stage, the user uses the secret key SKID1, to decrypt the Cipher Text (CT) and obtain the message M. During a Revoke stage of k users (k=1, 2, 3, . . . ) a State Update Message (SUM) which is sent to all users, is provided and each user updates his state with the SUM he received, such that the k users having identities ID1, ID2, . . . IDk will not be able to update their state and will be permanently revoked, while all the remaining users being admitted users will be able to update their state and will not be revoked. Temporary revocation is done by inserting a list of IDs (ID1, ID2, . . . IDk) to be revoked into the CT.
Description
FIELD OF THE INVENTION

The invention relates to the field of broadcast communication networks. Specifically the invention relates to the field of broadcast encryption with both temporary and permanent revocation capability.


BACKGROUND OF THE INVENTION

In broadcast encryption a single broadcaster can send encrypted messages to a group of users so that only authorized users can decrypt the messages. Such message may be for example, a secret key for decrypting content, such as a movie, which should be available for decryption only for subscribers (users) who paid a required fee to the content provider. Since the introduction of broadcast encryption there has been a great deal of work on extending the framework of broadcast encryption, thereby improving its security and optimizing its performance.


One of the factors driving interest in broadcast encryption is its commercial importance in content distribution, e.g. television networks. Historically, such networks were developed and administered by a single broadcaster who distributed both content and keys to registered users. In this setting, symmetric-key encryption is normally used, in which the broadcaster holds all the keys of the receivers.


A more flexible system allows separating between the key distribution and content distribution functions. In this setting, a single key manager generates and distributes keys to all users (subscribers), but multiple content providers can directly send encrypted content to users. The benefits of such an approach include lower barriers of entry for both key providers and content providers and potentially greater choice and lower cost for users. However, the separation of functions typically rules out symmetric-key encryption since the key manager would not want to share all the system's keys with a content provider.


Public-key broadcast encryption solves this problem by separating the keys into a public key and secret keys. The public key allows a content provider to encrypt content and the secret keys allow each authorized user to decrypt content.


Broadcast encryption schemes differ in the way that they determine authorized users. Upon joining the system (e.g., during a registration stage), a user is authorized to receive a subset of the distributed content (for example, a package of sports channels). This authorization is enforced by the keys that the key manager provides to the user. The key manager can decide to expand the subset of the content for which the user is authorized by providing additional keys. However, reducing the user's authorization or completely revoking that authorization requires a revocation procedure that invalidates the user's decryption keys.


Revocation in broadcast encryption schemes can generally be divided into two types, temporary revocation and permanent revocation. Typical revocation schemes for broadcast encryption are limited either to temporary revocation only or to permanent revocation only, often without explicitly stating the difference. However, in practice, both types of revocation are important.


Temporary Revocation


In temporary revocation, authorization is attached to a specific encrypted message and therefore revoking a user does not extend to subsequent messages. When using temporary revocation, the broadcaster must know which user will be able to decrypt the transmitted content and which user will not, and encrypt the content accordingly. Temporary revocation is required for example, when a user wishes to remain a subscriber, but does not want to receive a specific content (e.g., sports channels). In this case, he will be temporary revoked and will not be able to decrypt messages that are related to sports channels. However, a revoked user is temporarily revoked in each message and the public key that is used for encryption must contain the information who will and who will not be able to decrypt and therefore, when more and more users are revoked or authorized, the encryption (public) key becomes larger and larger. Also, temporary revocation approach suffers from two drawbacks. The first drawback is performance penalty, since the complexity of sending a message keeps growing as a function of historical revocations. The other drawback is that when the roles of key management and content distribution are separate, it may not be possible for a broadcaster to keep track of every revoked user. In addition, temporary revocation requires maintaining long lists of subscribers, which introduce substantial overhead both during encryption and decryption, as well as security problems (since these lists may leak is adversaries get access to them).


Permanent Revocation


In permanent revocation, the key manager revokes the authorization of a user, thereby preventing him from decrypting future messages (it is practically equivalent to taking back hardware from the user, such as his set-top box).


Permanent revocation may be the consequence of a user canceling his subscription and is therefore, a common feature of real-world broadcast encryption systems. A motivating example for temporary revocation is when a content provider distributes an encryption key for some premium content (e.g., a televised pay-per-view event), only to users who paid for the content. Subsequently, the content is broadcasted to all users in the system, but only the users who received the content key can decrypt it. In encryption schemes that use permanent revocation, the public key that is used for encryption is independent of the number of users (subscribers) which should be revoked. Also, each time a broadcaster starts encrypting a new content (e.g., a movie), encryption is made with respect to a current state. When a broadcaster wishes to determine which user will remain a subscriber and who will be revoked (e.g., if he stopped paying the required subscription fee), he can send a message containing state parameters to all users and as a result, only users that paid the fee will be able to update their state and remain subscribers and all the others will be revoked. This message is sent to all users every time the broadcaster wishes to revoke users. In order to remain a subscriber, upon receiving the message, each user must update his state. This way, all users that stopped paying the required subscription fee will be permanently revoked and will not be able to decrypt the message or any subsequent messages (unless performing the required registration process, like any new subscriber).


The security of broadcast encryption can be loosely defined as the property of non-authorized users being unable to decrypt ciphertexts and can be typically reduced to the security of a cryptographic primitive. Security definitions for broadcast security, differ in modeling the adversary. One feature of the adversary model is the number of users that the adversary may corrupt. Most broadcast encryption schemes assume that the adversary can control multiple users (possibly, an unbounded number of them) and therefore, require collusion resistance (i.e. require that even a coalition of unauthorized users working together cannot decrypt ciphertexts). A second feature determines whether the adversary (and the associated security proof) is adaptive or is only selective. An adaptive adversary decides dynamically which users to corrupt while in the selective setting the adversary selects the set of corrupted users before the key manager sets system parameters.


The performance of broadcast encryption is measured by the size of the objects in the system and the time required to perform the algorithms in the scheme as a function of the n users in the system and the number of revoked users. The measured objects include encryption and decryption keys, ciphertext length and messages for user revocation, which are part of the ciphertext in the case of temporary revocation and are separate from the ciphertext, for permanent revocation.


The performance of different broadcast encryption schemes is sometimes difficult to compare because each optimizes different measures. For example, the simplest broadcast encryption scheme involves encrypting a plaintext message separately with each authorized user's symmetric/public key. In this scheme, the encryption key, ciphertext length and time to perform encryption are O(n−r) for n users in the system and r revoked users. However, all other measures are O(1) and revocation is especially trivial for all users actually requiring less work for the key manager and broadcaster.


Important broadcasting parameters in these broadcasting schemes are the size of the public key that is used for encryption, the size of the secret key used for decryption and the size of the content. It is desired that encryption will require as less data traffic, as possible.


WO 2013/027206 discloses a method for broadcast encryption that allows a broadcaster to send encrypted data to a set of users such that only a subset of authorized users can decrypt said data. The method comprises modifications to the four stages of the basic Cipher-text Policy Attribute-Based Encryption techniques. It then claimed that the method can be adapted to transform any Attribute-Based Encryption scheme that supports only temporary revocation into a scheme that supports the permanent revocation of users.


According to this method, a part of each decryption key will be dynamic and each time a message is sent to a user, the key is updated, such that only users that should not be permanently revoked will be able to update his state (the broadcaster sends to each user a private key that includes the attributes of the user and a component that includes the state of the user, which is a function of a random control component that is frequently updated from the moment that the user completed a registration process and became a subscriber).


Another problem with the method proposed by WO 2013/027206 is related to security, since there may be collusion between an authorized subscriber who received the secret key for decryption (who is able to update his state) and a revoked subscriber. In this case, the revoked subscriber can learn from the authorized subscriber what should be the new updated state and continue decrypting, like he has been never revoked.


It is clear that permanent revocation alone is not sufficient, since there are situations when a broadcaster wishes to revoke a user just temporarily. Therefore, both types of revocations are required.


It is therefore an object of the present invention to provide a broadcast encryption scheme that overcomes the drawbacks of typical revocation schemes for broadcast encryption.


It is another object of the present invention to provide a broadcast encryption scheme that enables both temporary and permanent revocation, while keeping performance that is as good as broadcast encryption systems that achieve either temporary revocation or permanent revocation, separately.


It is another object of the present invention to provide a broadcast encryption scheme that enables both temporary and permanent revocation but prevent revoked users from decrypting messages, even in case of collusion between revoked users and users who can decrypt.


Other objects and advantages of the invention will become apparent as the description proceeds.


SUMMARY OF THE INVENTION

A broadcast encryption method that allows a broadcaster to send encrypted content to a set of users such that only a subset of authorized users can decrypt the content, and to perform both temporary and permanent revocation of users, comprising the following steps:

    • a) during a Setup stage:
      • a.1) a KeyService generates a public key and a Master Secret Key (MSK) and sends the Public Parameters PP used to generate the public key to a broadcaster and to all users;
      • a.2) the broadcaster uses the Public Parameters PP to create a message M, with which the broadcaster encrypts the content, and further creates a CipherText (CT), which is sent to all users;
    • b) during a KeyGen stage:
      • b.1) whenever a user wishes to decrypt the message M for decrypting the content, the user sends a request with his ID1 to the KeyService;
      • b.2) the KeyService generates a corresponding secret key SKID1;
      • b.3) the secret key SKID1 is sent to the user ID1 via a secure data channel;
    • c) during a Decrypt stage, the user uses the secret key SKID1, to decrypt the CipherText (CT) and obtain the message M; and
    • d) during a Revoke stage of k users (k=1, 2, 3, . . . ):
      • d.1) providing a State Update Message (SUM) which is sent to all users;
      • d.2) allowing each user to update his state with the SUM he received, such that the k users having identities ID1, ID2, . . . IDk will not be able to update their state and will be permanently revoked, while all the remaining users being admitted users will be able to update their state and will not be revoked.
      • In one aspect, temporary revocation is performed by inserting a list of IDs (ID1, ID2, . . . IDk) to be revoked into the CT. The revocation scheme may be Cipher-text Policy Attribute-Based Encryption (CP-ABE). The CP-ABE scheme further includes permanent revocation parameters, which are directed to specific users.
      • The CP-ABE scheme may further include permanent revocation parameters, which are directed to specific attributes of specific users.
      • A user can decrypt the ciphertext only if he is not one of the temporarily revoked users.
      • Revocation may be carried our using a Public Key Revocation Scheme, consisting of:
    • a) a Setup(λ) algorithm, which for a security parameter λ:
      • a.1) chooses a bilinear group G of prime order p such that |p|≥λ.
      • a.2) chooses random generators g, w∈G, random exponents α,γ,b∈Zp and sets ST=1.
      • a.3) randomly chooses a function ϕ8 from Fλ, a pseudo-random family of permutations over Zp, wherein the Master secret key MSK is MSK=(α,b,γ,w,ST,ϕ), and the public parameters PP are PP=(g,gbST,gb2ST,wb,e(g,g)αST).
    • b) a KeyGen(MSK, ID) algorithm, which for Given a user identity ID∈Zp and the master secret key MSK:
      • b.1) computes=ϕ(ID)∈Zp; and
      • b.2) sets D1=g−t,D2=(gbIDw)t,








D
3

=


1

α
+


b
2


t



-
γ


,








      •  D4=g(α+b2t)·ST,D5=false.

      • b.3) outputs SKID={D1, . . . , D5}.



    • c) a Revoke(S,PP,MSK) algorithm, which is adapted to:
      • c.1) change the state is by sending a single message that is sent to all users in parallel; given a set S={ID1, . . . , IDr} of identities to revoke, the public parameters and the master secret key. The algorithm sets ST′=ST and for =1 to r, computes:










ST


=


ST


·

(

α
+


b
2



t
i



)










S

i
,
1


=


1

α
+


b
2



t
i




-
γ


,


S

i
,
2


=

g

ST












      • c.2) whenever ti=ϕ(IDi), perform the following operations:

      • Update the master secret key by replacing ST with ST′;

      • Update the public parameters by replacing gbST,gb2ST and e(g,g)αST with gbST′,gb2ST′ and e(g,g)αST′ respectively.

      • Broadcast the key update message SUM={Si,1,Si,2}i=1r.



    • d) An UpdateKey (SKID,SUM,ID) algorithm, which is adapted to:
      • d.1) follow the Revoke stage and provides indication regarding how any user updated his state after receiving a Revoke message;
      • d.2) Given a key update message SUM for r revoked identities, update the secret key SKID.

    • e) An Encrypt(S,PP,M) algorithm for allowing the broadcaster who creates the content also encrypts it, based on the public parameters PP, a message M∈GT and a set S of revoked identities as an input.

    • f) a Decrypt(SKID,CT,PP) algorithm which attempts to retrieve the message M, based on a secret key SKID, a ciphertext CT and the public parameters PP.





Permanent revocation of specific attributes of users may be done directly in the revocation mechanism, without the need of providing new secret keys.


A broadcast encryption system that allows a broadcaster to send encrypted content to a set of users such that only a subset of authorized users can decrypt the content, and to perform both temporary and permanent revocation of users, which comprises:

    • a) a broadcasting server, having at least one processor, for:
      • a.1) obtaining content to be distributed to the authorized users;
      • a.2) obtaining encryption and decryption keys required for encrypting the content from a KeyService server;
      • a.3) encrypting the content and distributing the content to the authorized users,
      • wherein the broadcasting and KeyService servers are adapted to:
    • b) during a Setup stage:
      • a.1) the KeyService generates a public key and a Master Secret Key (MSK) and sends the Public Parameters PP used to generate the public key to a broadcaster and to all users;
      • a.2) the broadcaster uses the Public Parameters PP to create a message M, with which the broadcaster encrypts the content, and further creates a CipherText (CT), which is sent to all users;
    • c) during a KeyGen stage:
      • c.1) whenever a user wishes to decrypt the message M for decrypting the content, the user sends a request with his ID1 to the KeyService;
      • c.2) the KeyService generates a corresponding secret key SKID1;
      • c.3) the secret key SKID1 is sent to the user ID1 via a secure data channel;
    • d) during a Decrypt stage, the user uses the secret key SKID1, to decrypt the CipherText (CT) and obtain the message M; and
    • e) during a Revoke stage of k users (k=1, 2, 3, . . . ):
      • e.1) providing by the KeyService, a State Update Message (SUM) which is sent to all users;
      • e.2) allowing each user to update his state with the SUM he received, such that the k users having identities ID1, ID2, . . . IDk will not be able to update their state and will be permanently revoked, while all the remaining users being admitted users will be able to update their state and will not be revoked.


In one aspect, the KeyService may operate separately from the broadcaster, and performs one or more of the following:

    • a) generating and distributing Keys both to the broadcaster and to users who became subscribers, according to their attributes;
    • b) conducting billing operations for admitted users who registered and payed for their subscription; and
    • c) using the billing data for maintaining admitted users that paid for subscription, and for revocation of users who stopped paying.





BRIEF DESCRIPTION OF THE DRAWINGS

In the drawings:



FIG. 1A illustrates the flow of broadcast encryption without revocation; and



FIG. 1B illustrates the flow of broadcast encryption with permanent revocation capability, using the Revoke stage; and



FIG. 2 illustrates a broadcasting system which uses the broadcast encryption with both temporary and permanent revocation capability, according to an embodiment of the invention.





DETAILED DESCRIPTION OF THE INVENTION

Reference will now be made to an embodiment of the present invention, examples of which are provided in the accompanying figures for purposes of illustration only. One skilled in the art will readily recognize from the following description that alternative embodiments of the structures and methods exemplified herein may be employed, mutatis mutandis, without departing from the principles of the invention.


The invention proposes a broadcast encryption scheme, bases on public-key that enables both temporary and permanent revocation with performance that in every measure is as good as broadcast encryption systems that achieve either temporary revocation or permanent revocation separately.


At a high level, a broadcast encryption scheme with temporary and permanent revocation is defined as a protocol between a key manager, n receivers (or users) and an unbounded number of broadcasters. In some embodiments, the protocol includes six steps, each implemented with an algorithm: setup, key generation, encryption, decryption, (permanent) revocation and key update.


The proposed scheme may incorporate Cipher-text Policy Attribute-Based Encryption (CP-ABE—where a user has to possess a certain set of attributes in order to access data) techniques, to achieve temporary revocation. Registration of a user is done with predetermined attributes, which may be, for example, (1) a sports package and (2) watching time between 8:00 am to 2:00 pm, (3) gender and (4) age. Upon registration, these attributes may be part of the encryption, since the broadcaster may generate a formula (some logic function) from the attributes and the public encryption key will include the formula. This way, for example, only users that belong to a group of men in the age of 40-42 which are subscribers of sports package that is broadcasted between 8:00 am to 2:00 pm will be able to decrypt the message.


It is also possible to use Key Policy Attribute Based Encryption (KP-ABE) scheme. In this scheme, data is associated with the attributes for which a public key is defined for each. A broadcaster, who encrypts the data, is associated with the set of attributes to the data or message by encrypting it with a public key). In this scheme, the broadcaster encrypts with the attributes without the formula, while the decryption keys have the formula.


In one embodiment, ABE schemes may further include permanent revocation, which is directed to subscribers. For example, a user who stopped paying for the subscription will not be able to decrypt following massages, regardless its attributes.


In another embodiment, the ABE schemes may further include permanent revocation, which is directed only to specific attributes of users. This may be done by totally revoking their ability to decrypt and to provide him with a new secret key, which will allow him to decrypt messages that do not correspond to these specific attributes.


In another embodiment, the abovementioned functionality, permanent revocation of users' specific attributes can be done directly in the revocation mechanism without the need of providing new secret keys.


Description of the Revocation Process


The key manager runs a setup stage to generate system parameters including a Master Secret Key (MSK), which he retains, and a public key which is published. The key manager also performs key generation to create a secret key for each user in the system. It is assumed that a user receives the secret key in a secure, out-of-band method, e.g. by establishing a Virtual Private Network (VPN) between the key manager and the user.


A broadcaster executes the encryption algorithm which takes a set of temporarily revoked users as one of its parameters and outputs a ciphertext. A user can decrypt this ciphertext if and only if it is not one of the temporarily revoked users. The key manager performs the revocation algorithm which enables each of the non-revoked users to run key update and derive new secret keys. The revoked users will not be able to update their keys and will be unable to decrypt any ciphertexts in the future. However, it is always possible for a user to go through the key generation process again, receiving fresh keys.


The proposed scheme combines attributes from public-key temporary revocation systems and symmetric-key permanent revocation systems. A possible approach is to merge the two system types together in the sense of having each user hold independent keys for each system. The broadcaster secret shares each message and encrypts one share with the temporary revocation system and the other share with the permanent revocation system. Then a legitimate user can decrypt both shares and a revoked user will be unable to decrypt. However, this approach is not sufficiently secure when considering collusion between users who are only temporarily revoked and users who are only permanently revoked.


As an alternative to merging, the disclosed system merges the keys of the two schemes and modifies the six algorithms appropriately, to ensure correctness. It is proved that the construction is secure based on a two-step hybrid argument. The first step relies on the hardness of a novel computational problem which is formalized as the Mixed Exponent Assumption (MEA) and the second step is secure in the generic bilinear group model (disclosed, for example, in WO 2013/027206).


In this model (which is an idealized cryptographic model), an adversary can gain access only to random encoding of a group. The model includes an oracle (a virtual machine which is able to solve certain decision problems in a single operation) that executes the group operation and takes two encodings of group elements as input and outputs an encoding of a third element.


MEA is similar to discrete-log based hardness assumptions in that its input includes powers of a generator g of a group G with prime order p. The group elements in MEA (as in other hardness assumptions) are not independently chosen. There are correlations between the exponents of different group elements. Unlike other assumptions, the input of MEA also includes functions of these exponents directly in Zp. Intuitively, any combination of the elements in G and the elements in Zp is indistinguishable from a random element. In more detail, MEA states that the following problem is computationally hard.


Let Y∈Zpm be a vector of secrets, let V, U∈Zpn, let A be a n×m matrix, let F be a sequence of k multivariate polynomials over Y and let H∈Gk. Then, it is hard to distinguish between the pairs (V,H) and (U,H) if:

    • V=AY,U is randomly sampled from Zpn, H=gF (Y), i.e. if H=(h1, . . . , hk), F=(f1, . . . , fk) and Y=(y1, . . . , ym) then hi=gfi(y1, . . . , ym).
    • There does not exist a low-degree, multivariate polynomial p over Zp such that p(a1f1 (x1, . . . , xm), . . . , akfk (x1, . . . , xm)) is the zero polynomial, where a1, . . . , ak are arbitrary functions of V=(v1, . . . , vn). If G comes equipped with a bilinear mapping, then p must be of degree two, while otherwise it must be linear.


The MEA assumption is in fact a family of assumptions indexed by a matrix and a sequence of functions. A specific member of this family with matrix A and sequence of functions F is referred as (A,F)-MEA.


The public key and each secret key are of size O(1) group elements. A ciphertext which determines the temporary revocation of r users is of length O(r) group elements and the time complexity of both encryption and decryption is O(r). Similarly, the output of the revocation algorithm, which is used for permanent revocation of r′ users is of length O(r′) and the time complexity of both the revocation and key update algorithms are O(r′).


The disclosed construction benefits performance that enables many commercial applications. One such application can be a platform for broadcasting live events, such as sports matches and concerts. Usually, content providers of such events make their profit (content, not merchandise wise) by selling tickets and recorded videos of the events. With the proposed scheme, they can also make profit by broadcasting the events in real-time and thus reach clients that are unable to attend the events (there are many reasons for that e.g., sold out or too expensive tickets, geographic distance and more). Furthermore, it may help individuals who are unable to attend such events, to enjoy the experience of watching them live at reasonable prices. Another possibility is for content providers to sell the broadcast rights to hang-out venues such as bars and restaurants that may then offer their clients a richer experience and attract more clients.


According to an embodiment of the present disclosure, a revocation scheme that supports both temporary and permanent revocations consists of six algorithms: Setup, KeyGen, Revoke, UpdateKey, Encrypt and Decrypt.


Revocation Systems


In some embodiments, both temporary and permanent revocation schemes consist of six algorithms representing six steps of the scheme: Setup, Key Generation, Revoke, Update Key, Encrypt and Decrypt.


Setup(λ) stage: The Setup algorithm input is a security parameter λ. The setup algorithm chooses a 3-linear group G of prime order p for >2λ. It then chooses random generators g,w,h∈G and random exponents s,α,b,xsb,xαs1,xα12,custom character,{circumflex over (x)}∈Zp. The outputs of the algorithm are the Public Parameters (PP), and the master secret key (MSK), as follows:






PP
=

(


g

x
^


,

g


x

α





s





1




x

α





s





2




x
^



,

g


sx
sb



x
^



,

g

b

x
sb



,

g

x

x

α





s





1




,


w

α

x

α





s





2





G


)






MSK=(s,α,b,xsb,xαs1,xαs2,custom character,{circumflex over (x)}∈Zp,w∈G)


KeyGen(MSK,ID) stage: Given a user identity ID∈Zp and the master secret key MSK, the algorithm chooses random t∈Zp. It then sets








D
1

=

w


α
+
t

b



;


D
2

=

g
t


;


D
3

=


(


w
ID


h

)

t


;








S
1

=

g

s

ID
-




;


S
2

=



(


h

)


s

ID
-



.







The output of this algorithm is SKID={D1,D2,D3,S1,S2}.


Revoke(S,PP,MSK) stage: Given a set S of r identities to revoke, the algorithm chooses random s1′, . . . sr′∈Zp, sets s′=s1′+ . . . +sr′, and then for each identity IDi∈S it sets the following variables:

S1,IDi=gsi′;S2,IDi=(wIDih)si′;S3,IDi=IDi


The algorithm then:


1. Updates the master secret key by replacing s+S′;


2. Updates the public parameters by replacing







(


g


sb
sb



x
^



,

g

x

x

α





s





1





)






with






(


g


(

s
+

s



)



x
sb



x
^



,

g


(

s
+

s



)


x

α





s





1





)






respectively;


3. Broadcast the state update message SUM={S1,IDi,S2,IDi,S3,IDi}i=1r.


UpdateKey(SKID,SUM,ID) stage: Given a state update message SUM, the algorithm updates the secrety key SKID. It first checks if ID∈Ui=ir S3,IDi, and if so it outputs ⊥. Otherwise it calculates







S
1


=





i
=
1

r







S

1
,

ID
i



1

ID
-

S

3
,

ID
i







=




i
=
1

r







g


s
i



ID
-

ID
i













S
2


=





i
=
1

r







S

2
,

ID
i



1

ID
-

S

3
,

ID
i







=




i
=
1

r








(


w

ID
i



h

)



s
i



ID
-

ID
i










Finally it updates SKID by setting S1=S1·S1′ and S2=S2·S2′.


Encrypt(S,PP,M) stage: This algorithm takes as input a set S of identities to revoke, the public parameters PP and a message M∈GT. The algorithm first chooses a random exponent x∈Zp. Next the algorithm sets:








C
0

=

M
·

e


(


g

s

x

α





s





1




,



w

α

x

α





s





2






(

g


x

α





s





1




x

α





s





2




x
^



)


x


)




,


C
1

=


(

g

x
^


)

x


,


C
2

=


(

g


sx
xb



x
^



)

x






The output of the Encrypt algorithm is the ciphertext CT={CO,C1,C2}


Decrypt(SKID,CT,PP) stage: This algorithm is given a secret key SKID, a ciphertext CT and the public parameters PP. If SKID·revoked=true or ID is in the set of revoked users that correspond to CT, the algorithm outputs ⊥. Otherwise the algorithm begins with calculating A:






A
=



e


(


S
1

,

D
3

,

C
1


)



e


(


S
2

,

D
2

,

C
1


)



=



e
(



g

s

ID
-



·




i
=
1

r



g


s
i



ID
-

ID
i






,


(


w
ID


h

)

t

,


(

g

x
^


)

x


)


e
(




(


W


h

)


s

ID
-



·




i
=
1

r




(


W


h

)



s
i



ID
-

ID
i






,

g
t

,


(

g

x
^


)

x


)


=




e
(


s

g

ID
-



,


(


w
ID


h

)

t

,


(

g

x
^


)

x


)

·




i
=
1

r



e
(


e


s
i



ID
-

ID
i




,


(


w
ID


h

)

t

,


(

g

x
^


)

x


)





e
(



(


W


h

)


s

ID
-



,

g
t

,


(

g

x
^


)

x


)

·




i
=
1

r



e
(



(


W


h

)



s
i



ID
-

ID
i




,

g
t

,


(

g

x
^


)

x


)




=





e


(

g
,
g
,
w

)




sIDt


x
^


x


ID
-





e


(

g
,
g
,
w

)




s


t


x
^


x


ID
-









i
=
1

r





e


(

g
,
g
,
w

)





s
i



IDt


x
^


x


ID
-



ID
i







e


(

g
,
g
,
w

)





s
i




t


x
^


x


ID
-


ID
i









=




e


(

g
,
g
,
w

)



st


x
^


x







i
=
1

r




e


(

g
,
g
,
w

)




s
i


t


x
^


x




=


e


(

g
,
g
,
w

)




(

s
+

s



)


t


x
^


x











Finally the Decrypt algorithm calculates M:






M
=




C
0

·
A


e
(


C
2

,

g

b

x
sb



,

D
1




=



M
·

e
(


g


s
+

s




x

α





s





1




,

w

α

x

α





s





2




,


(

g


x

α





s





1




x

α





s





2




x
^



)

x


)

·


e


(

g
,
g
,
w

)




(

s
+

s



)


tx




e


(



(

g



s
+

s



)



x
sb



x
^



)

x

,

g

b

x
sb



,

w


(

α
+
t

)

b



)



=



M
·


e


(

g
,
g
,
w

)




(

s
+

s



)


α






x
^


x


·


e


(

g
,
g
,
w

)




(

s
+

s



)


t


x
^


x





e


(

g
,
g
,
w

)





(

s
+

s



)



x
^


x





α

+


(

s
+

s



)



x
^


xt




=
M







The system is required to satisfy the following correctness and security properties:


Correctness:


For all messages M, sets of identities S,S1, . . . Sn, and all ID∉Ui=1n(SiUS),

    • if (PP0,MSK0)←Setup(λ),SKID,0←KeyGen(MSK,ID) and for i=1, . . . , n:
    • (MSKi,PPi,SUMi)←Revoke(Si,PPi−1,MSKi−1)
    • SKID,i←UpdateKey(DKID,i−1,SUMi,ID)
      • then if CT←Encrypt(S,PPn,M) then Decrypt (SKIDn,CT,PPn)=M.


The security of a permanent revocation scheme is defined as a game between a challenger and an attack algorithm custom character with the following phases:


Setup


The challenger runs the Setup algorithm with security parameter λ to obtain the Public Parameters PP and the Master Secret Key MSK. It maintains a set of identities custom character initialized to the empty set and then sends PP to custom character.


Key Query and Revocation


In this phase custom character adaptively issues secret key and revocation queries. For every private key query for identity ID, the challenger adds ID to Q, runs KeyGen(MSK,ID)→SKID and sends to custom character the corresponding secret key SKID. For every revocation query for a set S of Identities, the challenger updates Q←Q\S, runs Revoke(S,PP,MSK)→(MSK′,PP′,SUM), replaces (MSK,PP) with (MSK′,PP′) and sends to custom character the new PP and the corresponding key update messages SUM.


Challenge



custom character sends to the challenger a set S of identities and two messages M1, M2. In case custom charactercustom characterS the challenger sends ⊥ to custom character and aborts. Otherwise, the challenger flips a random coin ∈{0,1}, runs the Encrypt(S,PP,Mb) algorithm to obtain an encryption of Mb and sends it to custom character.


Guess



custom character outputs a guess b′∈{0,1} and wins if b=b′.


The advantage custom character has in the security game for a permanent revocation scheme with security parameter λ is defined as Adcustom character=|Pr[custom character wins]−½|.


A permanent revocation scheme is adaptively secure if for all poly-time algorithms custom character, Adcustom character=negl(λ).


Selective security is defined similarly, except that the revoked sets of identities are declared by the adversary before it sees the public parameters in an Init phase.


Bilinear Maps


For groups G, GT of the same prime order p, a bilinear map e: G2→GT satisfies:

    • 1. Bilinearity—For every g1,g2∈G and α∈Zp it holds that

      e(g1α,g2)=e(g1,g2α)=e(g1,g2)α
    • 2. Non-degeneracy—If g1,g2∈G are generators of G then e(g1,g2) is a generator of GT.


G is called a (symmetric) bilinear group and GT is called the target group.


Pseudo-Random Functions (PRFs)


Intuitively, a family of Pseudo-Random Functions is a family of functions such that a randomly chosen member of the family cannot be efficiently distinguished from a truly random function by an algorithm that observes the function's output. The following definition states the requirements of a PRF more precisely for the disclosed systems:


Let (Aλ,Bλ)λ∈N be a sequence of pairs of domains and let F={Fλ}λ∈N be a function ensemble such that the random variable Fλ assumes values in the set of Aλ→Bλ functions. Then F is a PRF ensemble if:

    • Pseudo-randomness. For every PPT oracle machine M:

      |Pr(MFλ(1λ))=1−Pr(MUλ(1λ))=1|<negl(λ)
    • for a negligible function negl(⋅) where Uλ is distributed uniformly over Aλ→Bλ functions.
    • Efficient computation. There are efficient PPT algorithms to sample Fλ and compute the sampled function on any input.


PRF function families can be efficiently constructed for many useful domains Aλ, Bλ including the groups Zn=Z/nZ for any integer n. It is noted that in practice a PRF family can be instantiated by a block cipher such as AES where each function in the family corresponds to a cipher key.


Decisional MEA-Assumption


Let G be a group of primt order p with generator g, let A∈Zpn×m be a matrix and for a vector of formal variables X=(X1, . . . , Xm) define a vector Y=(Y1, . . . Yn) by AX=Y. Let F=(f1, . . . fk)∈Zp[Xi, . . . Xm]k be a k-tuple of m-variate poynomials such that for any degree two, k-variate polynomial p and for any k polynomials ϕ1, . . . ϕk∈Zp[Yi . . . Yn]k the polynomial p(ϕ1(Y)f1(X), . . . ϕk(Y)fk(X)) is not identically zero.


The decisional (A,F)-Mixed exponent problem in G is to distinguish between the distributions on the tuples (g,y,h) and (g,u,h) which are defined as follow. Choose a random x=(x1, . . . xm)∈Zpm, compute y=A·x and h=(h1, . . . hk) such that (hi=gfi(x1, . . . xm) for all i and sample u∈Zpn, randomly.


An algorithm custom character that outputs custom character∈{0,1} has advantage ϵ in solving the Decisional (A,F)-MEA-problem in G if |Pr[custom character(g,A,F,y,h)=1]−Pr[custom character(g,A,F,u,h)=1]|≥ϵ.


The Decisional (A,F)-Mixed Exponent Assumption ((A,F)-MEA) holds if any poly-time algorithm has a negligible advantage in solving the Decisional (A,F)-MEA-problem. The MEA family of assumptions is the set of all (A,F)-MEA-assumptions.


Public Key Revocation Scheme


Setup(λ) stage: The setup algorithm, given a security parameter λ, chooses a bilinear group G of prime order p such that |p|≥λ. It then chooses random generators g,w∈G, random exponents α,γ,b∈Zp and sets ST=1. Finally, the setup algorithm randomly chooses a function ϕ8 from Fλ, a pseudo-random family of permutations over Zp. The Master secret key MSK is MSK=(α,b,γ,w,ST,ϕ)), and the public parameters PP are PP=(g,gbST,gb2ST,wb,e(g,g)αST).


KeyGen(MSK, ID) stage: Given a user identity ID∈Zp and the master secret key MSK, the KeyGen algorithm computes t=ϕ(ID)∈Zp and sets D1=g−t,D2=(gbIDw)t,








D
3

=


1

α
+


b
2


t



-
γ


,





D4=g(α+b2t)·ST, D5=false.


The output of the KeyGen algorithm is SKID={D1, . . . , D5}.


Revoke(S,PP,MSK) stage: The revoke stage, the state is changed by sending a single message that is sent to all users in parallel. This algorithm is given a set S={ID1, . . . ,IDr} of identities to revoke, the public parameters and the master secret key. The algorithm sets ST′=ST and for i=1 to r it computes:

  • 1. ST′=ST′·(α+b2ti)








2.






S

i
,
1



=


1

α
+

b
2

+

t
i



-
γ


,


S

i
,
2


=

g

ST








Where ti=ϕ(IDi). The Revoke algorithm then performs the following operations:

  • 1. Updates the master secret key by replacing ST with ST′;
  • 2. Updates the public parameters by replacing gbST, gb2ST and e(g,g)αST with gbST′, gb2ST′ and e(g,g)αST′ respectively.
  • 3. Broadcasts the key update message SUM={Si,1,Si,2}i=1r.


    UpdateKey (SKID,SUM,ID) Stage:


During the UpdateKey stage follows the Revoke stage and provides indication regarding how any user updated his state after receiving a Revoke message. Some users will be able to update their state and the remaining users (which should be revoked) will not.


Given a key update message SUM for r revoked identities, the algorithm updates the secret key SKID. It first checks if D3∈Ui=1r Si,1 and if so it sets D5=true. Otherwise, it sets h0=D4. Then, for i=1 to r it sets







h
i

=



(


S

i
,
2



h

i
-
1



)



D
3

-

S

i
,
1




.






Finally, the algorithm updates SKID by replacing D4 with hr.


It should be noted that hr=g(α+b2t)·ST where ST is the new state in the master secret key after the corresponding revocation. For example, if t=ϕ(ID) and {circumflex over (t)}=ϕ(custom character), the the update process of SKID after the revocation of custom character is:










h
1

=




(


S

1
,
2



h
0


)



D
3

-

S

i
,
1










=




(


g

α
+


b
2



t
^





g

α
+


b
2


t




)


1


(


1

α
+


b
2


t



-
γ

)

-

(


1

α
+


b
2



t
^




-
γ

)










=




(


g

α
+


b
2



t
^





g

α
+


b
2


t




)


1



(

α
+


b
2



t
^



)

-

(

α
+


b
2



t
^



)








(

α
+


b
2


t


)



(

α
+


b
2



t
^



)












=



g


(

α
+


b
2


t


)



(

α
+


b
2



t
^



)










Encrypt(S,PP,M) stage: During the Encrypt stage, the broadcaster who creates the content also encrypts it. The encryption algorithm takes as input the public parameters PP, a message M∈GT and a set S of revoked identities. The algorithm first lets r=|S|, chooses r random exponents s1, . . . , sr∈Zp and sets s=Σi=1r si.


Next, the algorithm sets C0=M·e(g,g)αsST, C1=gs, and for i=1 to r sets Ci,1=IDi, Ci,2=(gbST)si, Ci,3=(gb2STIDiwb)si.


The output of the algorithm is CT={CO,C1,{Ci,1,Ci,2Ci,3}i=1r}.


Decrypt(SKID,CT,PP) stage: The decryption algorithm is given a secret key SKID, a ciphertext CT and the public parameters PP. First, if D5=true or ID∈Ui=1r Ci,1 then the algorithm outputs ⊥. Otherwise the algorithm calculates:






A
=


e


(


C
1

,

D
4


)


=


e


(


g
s

,

g


(

α
+


b
2


t


)

·
ST



)


=



e


(

g
,
g

)



(

α





sST

)


·


e


(

g
,
g

)




b
2


stST














B
=






i
=
1

r








(


e


(


C

i
,
2


,

D
2


)


·

e


(


C

i
,
3


,

D
1


)



)


1

ID
-

C

i
,
1












=






i
=
1

r




(


e


(



(

g
bST

)


s
i


,


(


g
bID


w

)

t


)


·

e


(



(


g


b
2



STID
i





w
b


)


S
i


,

g

-
t



)



)


1

ID
-

ID
i











=




e


(

g
,
g

)






i
=
1

r



(


b
2



s
i


tST

)









=




e


(

g
,
g

)




b
2


stST









Finally the algorithm retrieves the message:

M=C0/(A/B)

Security Analysis


By simulating a sequence of the security games against an adversary, each one indistinguishable from the next, it can be proved that the disclosed revocation scheme is generically secure over bilinear groups. The first game is the original security game. In the next game the elements correspond to D3 in the secret keys are replaced with random elements. Indistinguishably follows directly from the MEA assumption. In the next game the cipher text is changed to a random element.


Given an adversary custom character, with non-negligible advantage ϵ=ADcustom character in the security game against the disclosed construction, a simulator custom character is defined that plays the decisional MEA problem.


Let A=Zpn×(2n+q+4) be the following matrix:







A

n
×

(


2

n

+
4
+
q

)



=

(






-
1

_






-
1











-
1




|







0





0



_













I

n
×
n












|
0

)





Let (p1′, . . . , p7′)∈Fp[Y1, . . . , Ym]7 be the following polynomials:








p
1




(

Y
1

)


=

Y
1

-
1










p
2




(


y
1

,

Y
2

,

Y
3


)


=


(


Y
1

-
1


-

Y
2

-
1



)

*

Y
3
2










p
3




(

Y
1

)


=

Y
1

-
2










p
4




(


Y
1

,

Y
2


)


=


Y
1

-
1


*

Y
2

-
1











p
5




(


Y
1

,

Y
2

,

Y
3

,

Y
4

,

Y
5


)


=


(



Y
2

-
1


*

Y
4


+

Y
5

-
1



)



(


Y
1

-
1


-

Y
2

-
1



)

*

Y
3
2










p
6




(


Y
1

,





,

Y
q


)


=




i
=
1

q



Y
i

-
1











p
7




(


Y
1

,

Y
2

,

Y
3

,

Y
4


)


=


(



Y
1

-
2


*

Y
2


+

Y
3

-
1



)



(

Y
4

-
1


)






Let F=(f1, . . . , fk)∈Fp[X1, . . . Xm]k be the following polynomials:

1≤i≤n fy,i=p1′(Xi+1)
1≤i≤n ft1,i=p2′(Xi+1,Xn+2,Xn+3)
fb=p1′(Xn+3)
fb2=p3′(Xn+3)
fwb=p4′(Xn+3,Xn+4)
1≤i≤n ft2,i=p5′(Xi+1,Xn+2,Xn+3,Xn+4+i,Xn+4)
ps=f6′(X2n+5, . . . ,X2n+q+4)
1≤i≤q fs1,i=p4′(Xn+3,X2n+4+i)
1≤i≤q fs2,i=p7′(Xn+3,Xn+4+i,Xn+4,X2n+4+i)
fαs=p6′(X2n+5, . . . ,X2n+q+4)p1′(Xn+2)



custom character receives an (A,F)-MEA challenge X=(g,A,F,T,h). It then plays the original security game against the adversary. Let τ be the number of permanent revocation requests that the adversary performs. Let ρi denote the number of revoked users in the i-th request. Their identities are denoted by IDij where i is in [1, τ] and j is in [1, ρi]. Similarly, STi,j is used to denote the state after the revocation of the j-th identity in the i-th group. Let ψi denote the number of secret key requests the adversary performs after the i-th permanent revocation request (ψ0 is the number of secret key requests prior to the first revocation). the identities for which the adversary requests keys are denoted by IDkm where k is in [0, τ] and m is in [1, ψi] and tk,m to denote f(IDkm). Let q denote the number of users the adversary revoke during the temporary revocation. Their identities are denoted by IDi where i is in [1, q].


Next, the elements that the adversary learns during the security game are written, from which a computational assumption is stated. From the public parameters and revocation requests, the adversary learns











i


[

0
,
τ

]


,

j


[

1
,

ρ
i


]











1

ST

i
,
j



-
γ


,

g

ST

i
,
j



,

g

b
·

ST

i
,
j




,

g


b
2

·

ST

i
,
j




,


e


(

g
,
g

)



α
·

ST

i
,
j









where






ST

i
,
j


=





i


=
1

i











j


=
1

j




(

α
+


b
2



t


i



j






)

.







From the secret key requests, the adversary learns











k


[

0
,
τ

]


,

m


[

1
,

ψ
k


]






ID

k
m



,

g

-

l

k
m




,


(


g

bID

k
m




w

)


t

k
m



,


1

α
+


b
2



t

k
m





-
γ

,

g


(

α
+


b
2



t

k
m




)



ST

k
,
m
















ST

k
,
m


=





k


=
1

k











m


=
1


ρ
k










(

α
+


b
2



t


k



m






)






where








Finally, from the challenge, the adversary learns

gs,M·e(g,g)αsSTfinal
i∈[1,q](gBSTfinal)si,(gb2STfinalIDiwb)Si


where







ST
final

=




i
=
1

τ










j
=
1


p
i




(

α
+


b
2



t

i
j




)







For each identity IDkm the adversary obtains a key that either IDkm is revoked in one of the (τ−k) permanent revocations following the creation of custom character, or that IDkm is revoked in the temporary revocation during the challenge phase. Thus, the next assumption captures the security of the disclosed scheme.


(n−q)-Decisional Multi-Exponent Assumption:


Let custom character be a bilinear group of prime order p. For any (τ, ρ1, . . . , ρτ, ψ0, . . . , ψτ) such that Σk=0τγk=n and Σi=0ρi=n−q the (n−q)-Decisional Multi-Exponent problem in custom character is as follows:


A challenger chooses generators g, w∈custom character and random exponents,b,γ,{tkm}k∈[0,τ],m∈[1,ψk]. Suppose an adversary is given X=










i


[

0
,
τ

]


,

j


[

1
,

ρ
i


]






{






ID

i
j


,








1





i


=
1

i











j


=
1

j







(

α
+


b
2



t


i



j






)




-
γ

,

g





i


=
1

i











j


=
1

j







(

α
+


b
2



t


i



j






)




,







g

b
·





i


=
1

i











j


=
1

j







(

α
+


b
2



t


i



j






)





,

g


b
2

·





i


=
1

i











j


=
1

j







(

α
+


b
2



t


i



j






)





,







e


(

g
,
g

)



α
·





i


=
1

i











j


=
1

j







(

α
+


b
2



t


i



j






)






















i


[

0
,
τ

]


,

m


[

1
,

ψ
k


]






{







ID

k
m


,

g

-

t

k
m




,


(


g

bID

k
m




w

)


t

k
m



,


1

α
+


b
2



t

k
m





-
γ

,







g

(

α
+


b
2



t

k
m




)


·





k


=
1

k











m


=
1


ρ
k









(

α
+


b
2



t


k



m






)

















g
s















1
,
q








(

g

b
·




i
=
1

τ










j
=
1


ρ
i








(

α
+


b
2



t

i
j




)





)


s





,


(


g


b
2

·




i
=
1

τ










j
=
1


ρ
i









(

α
+


b
2



t

i
j




)

·

ID









w
b


)


s












such that









{

ID

k
m


}



k


[

0
,
τ

]


,

m


[

1
,

ψ
k


]







{

ID

i
j


}



i


[

0
,
τ

]


,

j


[

1
,

ρ
i


]







{

ID


}


l


[

1
,
q

]





=





Then it must be hard to distinguish






T
=


e


(

g
,
g

)



α






s
·




i
=
1

τ










j
=
1


ρ
i








(

α
+


b
2



t

i
j




)










from a random element R∈custom characterT. An algorithm custom character that outputs z∈{0,1} has advantage ϵ in solving the (n−q)-Decisional Multi-Exponent problem in g if








Adv
nqdme



(

n
,
q
,
A

)


:=





Pr


[

A


(

X
,

T
=


e


(

g
,
g

)



α






s
·




i
=
1

τ










j
=
1


ρ
i








(

α
+


b
2



t

i
j




)








)


]


-

Pr


[

A


(

X
,

T
=
R


)


]






ϵ





The decision (n−q)-Decisional Multi-Exponent Assumption holds if no poly-time algorithm has a non-negligible advantage in solving the (n−q)-Decisional Multi-Exponent problem.


In the second game, custom character uses the (A,F)-MEA challenge to simulate the security game. The random exponents chosen by the (A,F)-MEA challenger are denoted by






x
=


(

γ
,

γ
1

,








y
n


,

1
α

,

1
b

,

1
w

,

ID
1

,








ID
n


,

1

s
1


,








1

s
q




)

.






custom character can use h to simulate all the needed group elements since












1

i

n











g


p

y
,
i




(

x

l
+
1


)



=

g

α
+


b
2



t
i












1

i

n






g


p


t





1

,
i




(


x

i
+
1


,

x

n
+
2


,

x

n
+
3



)



=

g

-

t
i















g

pb


(

x

n
+
3


)



=

g
b













g

pb





2


(

x

n
+
3


)



=

g

b
2














g

pwb


(


x

n
+
3


,

x

n
+
4



)





w
b









1

i

n






g


p

t






2
i





(


x

i
+
1


,

x

n
+
2


,

x

n
+
3


,

x

n
+
4
+
1


,

x

n
+
4



)



=

g


(


bID
i

+
b

)



t
i















g

ps
(


x


2

n

+
5


,

,

x


2

n

+
q
+
4



)


=

g
s









1

i

q






q


p

s






1
i





(


x

n
+
3


,

x


2

n

+
4
+
1



)



=

g

bs
i










1

i

q






g


p


s





2

,
i




(


x

n
+
3


,

x

n
+
4
+
i


,

x

n
+
4


,

x


2

n

+
4
+
i



)



=

g


(



b
2



ID
j


+
b

)



s
i

















e


(

g
,
g

)



p





α






s


(


x


2

n

+
5


,

,


x


2

n

+
q
+
4




x

n
+
2




)




)

=


e


(

g
,
g

)



α





s










custom character taeks D3 elements from T. If T=A×e these elements have the same distribution as in the real security game since







T
i

=


1

α
+


b
2



t
i




-

γ
.







It follows that the simulation provided by custom characteris perfect unless T is a random element in Zpn. Assuming the MEA holds, custom character cannot distinguish between the games.


According to one embodiment, the proposed revocation system (which supports both temporary and permanent revocation) may be separated from the broadcasting system (unlike the previous embodiments, in which the keys were part of the broadcasted content). For example, the broadcaster may encrypt the content with a public key and each user will be able to purchase the secret key from a 3rd party (such as PayPal), to thereby become a subscriber. In this embodiment, the 3rd party will handle all payment issues. The broadcasting system will use the payment data for maintaining users that paid (subscribers) and for updating keys for both revocations.



FIG. 1A illustrates the flow of broadcast encryption without revocation. Accordingly, during a Setup stage, a KeyService generates a public key and a Master Secret Key (MSK). The MSK is kept by the KeyService and the Public Parameters PP (used to generate the public key) are sent to the broadcaster and to all users.


When the broadcaster wishes to send the public key (in the form of a message M, with which he encrypted the content) to all users (subscribers), he uses the Public Parameters PP to create the message M and further creates a CipherText (CT), which is sent to all users. When a user wishes to decrypt the content he received, he sends a request with his ID1 (RequestID1) to the KeyService, which by the KeyGen stage, generates a corresponding secret key SKID1. The secret key SKID1 is sent to the user ID1 via a secure channel. Then the user performs a Decrypt operation using secret key SKID1, decrypt the CipherText (CT) and obtain the message M.



FIG. 1B illustrates the flow of broadcast encryption with permanent revocation capability, using the Revoke stage. Revocation is made with respect to desired k users identities ID1, ID2, . . . IDk, which should be revoked. The algorithm Revoke (MSK, {ID1, ID2, . . . , IDk}) provides a State Update Message (SUM) which is sent to all users. Each user tries to update his state with the SUM he received. As a result, the k users with identities ID1, ID2, . . . IDk will not be able to update their state (and therefore, will be permanently revoked). All the remaining users (admitted users) will be able to update their state and will not be revoked. At the next stage (following state update), the broadcaster will encrypt again with a CT and will send to all user. Then each user will try to decrypt the message. If for a user ID=ID1, that user will not be able to decrypt. Otherwise, he will be able to decrypt (since the current ID is different from the past: ID≠ID1). The permanent revocation is therefore independent of the CT.


If temporary revocation is desired, it is possible to insert a list of IDs (ID1, ID2, . . . IDk), to be revoked into the CT. This way, the same flow may be used for performing temporary revocation, as well.



FIG. 2 illustrates a broadcasting system which uses the broadcast encryption with both temporary and permanent revocation capability, according to an embodiment of the invention. The broadcasting system 20 may be for example, a system of a broadcaster 23 (e.g., a satellite TV provider or a cable TV provider), which purchases content 22 (such as movies or TV programs, which are stored on a content server) from a content provider 21, encrypts is with an encryption server 24 and distributes the encrypted content to users u1, . . . , un, which are admitted subscribers. As described above, the broadcaster 23 encrypts the content 22 with a public key, and is able to allow admitted users to decrypt the content they demand and pay for, as well as to remotely perform temporary or permanent revocation of users (subscribers), according to payment and subscription terms that they should fulfil, according to the schemes described above.


The proposed scheme used by the broadcasting system has the following advantages over other schemes:

    • The system uses a Public-key;
    • The system supports both Temporary and permanent revocation
    • Revocation of r users requires O(r) operations
    • A revocation message comprises O(r) group elements
    • The Ciphertext and keys are O(1) groups elements
    • The system is stateful (a stateful server remembers client data (state) from one request to the next and is more efficient because clients do not have to provide full file information every time they perform an operation)
    • The system is based on Bilinear maps and is secure in the generic bilinear group model
    • New type of security assumptions—DH-MEA


The proposed scheme is more secure, since in case of collusion between revoked users, they will not be able to decrypt. In case of collusion between revoked users and users who can decrypt, at most, they will be able to decrypt the current specific massage but not future messages, as it will require performing successful state update. It is also more efficient, since it does not require using 3-linear groups and can be performed using bi-linear groups.


The KeyService may operate separately from the broadcaster, to handle key generation, distribution, update, as well has to handle all billing issues and payment of subscribers. For example, the KeyService may generate and distribute Keys both to the broadcaster and to users who became subscribers, according to their attributes;

    • a) conducting billing operations for admitted users who registered and payed for their subscription; and
    • b) using the billing data for maintaining admitted users that paid for subscription, and for revocation of users who stopped paying.


Although embodiments of the invention have been described by way of illustration, it will be understood that the invention may be carried out with many variations, modifications, and adaptations, without exceeding the scope of the claims.

Claims
  • 1. A broadcast encryption method that allows a broadcaster to send encrypted content to a set of users such that only a subset of authorized users can decrypt said content, and to perform both temporary and permanent revocation of users, comprising: a) during a Setup stage: a.1) a KeyService generates a public key and a Master Secret Key (MSK) and sends the Public Parameters PP used to generate said public key to a broadcaster and to all users;a.2) said broadcaster uses the Public Parameters PP to create a message M, with which said broadcaster encrypts the content, and further creates a CipherText (CT), which is sent to all users;b) during a KeyGen stage: b.1) whenever a user wishes to decrypt said message M for decrypting said content, said user sends a request with his ID1 to said KeyService;b.2) said KeyService generates a corresponding secret key SKID1;b.3) said secret key SKID1 is sent to the user ID1 via a secure data channel;c) during a Decrypt stage, said user uses said secret key SKID1, to decrypt the CipherText (CT) and obtain said message M; andd) during a Revoke stage of k users (k=1, 2, 3, . . . ): d.1 ) providing a State Update Message (SUM) which is sent to all users;d.2) allowing each user to update his state with said SUM he received, such that said k users having identities ID1, ID2, . . . IDk will not be able to update their state and will be permanently revoked, while all the remaining users being admitted users will be able to update their state and will not be revoked;wherein said revocation is carried out using a Public Key Revocation Scheme, consisting of:A) a Setup (λ) algorithm , which for a security parameter λ: A.1) chooses a bilinear group G of prime order p such that |p|≥λ;A.2) chooses random generators g, w∈G, random exponents α,γ,b∈Zp and sets ST=1,A.3) randomly chooses a function ϕ8 from Fλ, a pseudo-random family of permutations over Zp, wherein the Master secret key MSK is MS=(α,b,γ,w,ST,ϕ), and the public parameters PP are PP=(g,gbST, gb2st,wb,e(g,g,)αST);B) a KeyGen(MSK, ID) algorithm, which for Given a user identity ID∈Zp and the master secret key MSK: B.1) computes=ϕ(ID)∈Zp; andB.2) sets D1=g−t,D2=(gbIDw)t,
  • 2. The method according to claim 1, further comprising performing temporary revocation by inserting a list of IDs (ID1, ID2, . . . IDk) to be revoked into the CT.
  • 3. The method according to claim 1, wherein the revocation scheme is Cipher-text Policy Attribute-Based Encryption (CP-ABE).
  • 4. The method according to claim 3, wherein the CP-ABE scheme further includes permanent revocation parameters, which are directed to specific users.
  • 5. The method according to claim 3, wherein the CP-ABE scheme further includes permanent revocation parameters, which are directed to specific attributes of specific users.
  • 6. The method according to claim 1, wherein a user can decrypt the ciphertext only if he is not one of the temporarily revoked users.
  • 7. The method according to claim 1, wherein permanent revocation of specific attributes of users is done directly in the revocation mechanism, without the need of providing new secret keys.
  • 8. A broadcast encryption system that allows a broadcaster to send encrypted content to a set of users such that only a subset of authorized users can decrypt said content, and to perform both temporary and permanent revocation of users, comprising: a) a broadcasting server, being an electronic device which is operable to: a.1) obtain content to be distributed to said authorized users;a.2) obtain encryption and decryption keys required for encrypting said content from a KeyService server;a.3) encrypt said content and distributing said content to said authorized users, wherein said broadcasting and KeyService servers are electronic devices which are operable to:b) during a Setup stage: b.1) said KeyService generates a public key and a Master Secret Key (MSK) and sends the Public Parameters PP used to generate said public key to a broadcaster and to all users;b.2) said broadcaster uses the Public Parameters PP to create a message M, with which said broadcaster encrypts the content, and further creates a CipherText (CT), which is sent to all users;c) during a KeyGen stage: c.1) whenever a user wishes to decrypt said message M for decrypting said content, said user sends a request with his ID1 to said KeyService;c.2) said KeyService generates a corresponding secret key SKID1;c.3) said secret key SKID1 is sent to the user ID1 via a secure data channel;d) during a Decrypt stage, said user uses said secret key SKID1, to decrypt the CipherText (CT) and obtain said message M; ande) during a Revoke stage of k users (k=1, 2, 3, . . .): e.1) providing by said KeyService, a State Update Message (SUM) which is sent to all users;e.2) allowing each user to update his state with said SUM he received, such that said k users having identities ID1, ID2, . . . IDk will not be able to update their state and will be permanently revoked, while all the remaining users being admitted users will be able to update their state and will not be revoked;wherein said revocation is carried out using a Public Key Revocation Scheme, consisting of:A) a Setup(λ) algorithm , which for a security parameter λ: A.1) chooses a bilinear group G of prime order p such that |p|≥λ;A.2) chooses random generators g,w∈G, random exponents α,γ,b∈Zp and sets ST=1, A.3) randomly chooses a function ϕ8 from Fλ, a pseudo-random family of permutations over Zp, wherein the Master secret key MSK is MSK=(α,b,γ,w,ST,ϕ), and the public parameters PP are PP=(g,gbST,gb2ST,wb,e(g,g,)αST);B) a KeyGen(MSK, ID) algorithm, which for Given a user identity ID∈Zp and the master secret key MSK: B.1) computes=ϕ(ID)∈Zp; andB.2) sets D1=g−1D2=(GBIDw)t,
  • 9. The broadcast encryption system according to claim 8, in which the KeyService operates separately from the broadcaster, and performs one or more of the following: c) generating and distributing Keys both to the broadcaster and to users who became subscribers, according to their attributes;d) conducting billing operations for admitted users who registered and paid for their subscription; ande) using the billing data for maintaining admitted users that paid for subscription, and for revocation of users who stopped paying.
PCT Information
Filing Document Filing Date Country Kind
PCT/IL2018/050510 5/10/2018 WO 00
Publishing Document Publishing Date Country Kind
WO2018/207187 11/15/2018 WO A
US Referenced Citations (7)
Number Name Date Kind
6397329 Aiello May 2002 B1
20080298582 Sakai Dec 2008 A1
20090138704 Delerablee May 2009 A1
20120257756 Huang et al. Oct 2012 A1
20130308776 Delerablee et al. Nov 2013 A1
20140226816 Dolev et al. Aug 2014 A1
20170359315 Zhang Dec 2017 A1
Foreign Referenced Citations (2)
Number Date Country
2013027206 Feb 2013 WO
2016189105 Dec 2016 WO
Non-Patent Literature Citations (4)
Entry
International Search Report for PCT/IL2018/050510, dated Jul. 30, 2018, 4 pages.
Written Opinion of the International Searching Authority for PCT/IL2018/050510, dated Jul. 30, 2018, 5 pages.
Pascal Junod et al., “An efficient public-key attribute-based broadcase encryption scheme allowing arbitrary access policies” 10th Annual ACM Workshop on Digital Rights Management 2010, Oct. 4, 2010), 13 pages.
Hartono Kumio et al., “Efficient Revocation Schemes for Secure Multicase” Dec. 31, 2001, 21 pages.
Related Publications (1)
Number Date Country
20200186347 A1 Jun 2020 US
Provisional Applications (2)
Number Date Country
62503696 May 2017 US
62544936 Aug 2017 US