560 likes | 642 Views
What ~1.25 turned out to be or Complex poles and DVDs. Ilya Mironov Microsoft Research, SVC October 3 rd , 2003. One-to-One Communications. Alice. Bob. One-to-Many Communications. Alice. Bob. Carl. Zing. One-to-Many Communications. Alice. Bob. Carl. Zing.
E N D
What ~1.25 turned out to beorComplex poles and DVDs Ilya Mironov Microsoft Research, SVC October 3rd, 2003
One-to-One Communications Alice Bob
One-to-Many Communications Alice Bob Carl Zing
One-to-Many Communications Alice Bob Carl Zing
One-to-Many Communications Alice Bob Carl Zing
One-to-Many Communications Alice Bob Carl Zing
Broadcast Alice Bob Carl Zing
Broadcast Alice Bob Carl Zing
Real Life Examples of Broadcast • Pay-per-view • Satellite radio, TV (“dishes”) • DVD players Stateless receivers
k Broadcast encryption source k k k k k k k k k k receivers Very little overhead One rogue user compromises the whole system
Broadcast encryption source k1, k2, k3, k4, k5,…, kn k1 k2 k3 k4 k5 k6 k7 … kn receivers broadcast E[k1,k], E[k2,k],…, E[kn,k], E[k,M]
Broadcast encryption source k1, k2, k3, k4, k5,…, kn k1 k2 k3 k4 k5 k6 k7 … kn receivers Simple user revocation Too many keys
Botched attempts • CSS (most famous for the DeCSS crack) • CPRM (IBM, Intel, Matsushita, Toshiba) Can revoke only 10,000 devices in 3Mb
S4 S5 S3 Subset-cover framework(Naor-Naor-Lotspiech’01) S1 S7 S8 S6 S2
S4 S5 u S3 Subset-cover framework(Naor-Naor-Lotspiech’01) receiver u knows keys: k3 k5 k4 S1 S7 S8 S6 S2
Key distribution • Based on some formal characteristic: e.g., DVD player’s serial number • Using some real-life descriptors: • CMU students/faculty • researchers • Pennsylvania state residents • college-educated
Broadcast using subset cover S10 S8 S1 S6 S3 S5 header uses k1, k3, k5, k6, k8, k10
Subtree difference All receivers are associated with the leaves of a full binary tree k0 k00 k01 k0…0 k0…1 k1…1
Subtree differences special set Si,j i j
Greedy algorithm • Easy greedy algorithm for constructing a subtree cover for any set of revoked users
Greedy algorithm • Find a node such that both of its children have exactly one revoked descendant
Greedy algorithm • Add (at most) two sets to the cover
Greedy algorithm • Revoke the entire subtree
Greedy algorithm • Could be less than two sets
Average-case analysis • R - number of revoked users C – number of sets in the cover C ≤ 2R-1 • averaged over sets of fixed size [NNL’01] E[C] ≤ 1.38R • simulation experiments give [NNL’01] E[C] ~ R 1.25
Hypothesis 1.25… = 5/4
Different Model • Revoke each user independently at random with probability p
Exact formula If a user is revoked with probability p«1: where
Exact formula If a user is revoked with probability p«1: where
Asymptotic E[C]/E[R] 1.24511 p
Asymptotic E[C]/E[R] 1.2451134… 1.2451114… p
Exact formula If a user is revoked with probability p«1: where
Singularities of f Function f cannot be analytically continued beyond the unit disk
One approach 5 pages of dense computations – series, o, O, lim, etc. produce only the constant term
Approximation For small q where
The Mellin Transform Poles at 0, -1, -2, -3, … and
Complex poles … -3 -2 -1 0
Approximation where p = 1-q
Asymptotic E[C]/E[R] 1.2451134… 3log2 4/3 1.2451114… p
Average-case analysis R - number of revoked users C – number of sets in the cover If a user is revoked with probability p«1: E[C] ≈ 1.24511 E[R]