Title: What 1.25 turned out to be or Complex poles and DVDs
1What 1.25 turned out to beorComplex poles and
DVDs
- Ilya Mironov
- Microsoft Research, SVC
- October 3rd, 2003
2One-to-One Communications
Alice
Bob
3One-to-Many Communications
Alice
Bob
Carl
Zing
4One-to-Many Communications
Alice
Bob
Carl
Zing
5One-to-Many Communications
Alice
Bob
Carl
Zing
6One-to-Many Communications
Alice
Bob
Carl
Zing
7Broadcast
Alice
Bob
Carl
Zing
8Broadcast
Alice
Bob
Carl
Zing
9Real Life Examples of Broadcast
- Pay-per-view
- Satellite radio, TV (dishes)
- DVD players
Stateless receivers
10Broadcast encryption
source
k
k
k
k
k
k
k
k
k
k
receivers
? Very little overhead
? One rogue user compromises the whole system
11Broadcast encryption
source
k1, k2, k3, k4, k5,, kn
k1
k2
k3
k4
k5
k6
k7
kn
receivers
broadcast Ek1,k, Ek2,k,, Ekn,k, Ek,M
12Broadcast encryption
source
k1, k2, k3, k4, k5,, kn
k1
k2
k3
k4
k5
k6
k7
kn
receivers
? Simple user revocation
? Too many keys
13Botched attempts
- CSS (most famous for the DeCSS crack)
- CPRM (IBM, Intel, Matsushita, Toshiba) Can revoke
only 10,000 devices in 3Mb
14Subset-cover framework (Naor-Naor-Lotspiech01)
S1
S7
S8
S6
S2
15Subset-cover framework (Naor-Naor-Lotspiech01)
k3
k5
receiver u knows keys
k4
S1
S7
S8
S6
S2
16Key distribution
- Based on some formal characteristic e.g., DVD
players serial number - Using some real-life descriptors
- CMU students/faculty
- researchers
- Pennsylvania state residents
- college-educated
17Broadcast using subset cover
S10
S1
S8
S6
S3
S5
header uses k1, k3, k5, k6, k8, k10
18Subtree difference
All receivers are associated with the leaves of a
full binary tree
k0
k00
k01
k00
k01
k11
19Subtree differences
special set Si,j
i
j
20Subtree difference
21Subtree difference
22Subtree difference
23Subtree difference
24Subtree difference
25Subtree difference
26Subtree difference
27Subtree difference
28Greedy algorithm
- Easy greedy algorithm for constructing a subtree
cover for any set of revoked users
29Greedy algorithm
- Find a node such that both of its children have
exactly one revoked descendant
30Greedy algorithm
- Add (at most) two sets to the cover
31Greedy algorithm
- Revoke the entire subtree
32Greedy algorithm
- Could be less than two sets
33Average-case analysis
- R - number of revoked users
- C number of sets in the cover
- C 2R-1
- averaged over sets of fixed size NNL01
- EC 1.38R
- simulation experiments give NNL01
- EC R
1.25
34Hypothesis
35Different Model
- Revoke each user independently at random with
probability p
36Exact formula
If a user is revoked with probability p1
where
37Exact formula
If a user is revoked with probability p1
where
38Asymptotic
EC/ER
1.24511
p
39Asymptotic
EC/ER
1.2451134
1.2451114
p
40Exact formula
If a user is revoked with probability p1
where
41Singularities of f
Function f cannot be analytically continued
beyond the unit disk
42One approach
- 5 pages of dense computations series, o, O,
lim, etc. - produce only the constant term
43Mellin transform
44Approximation
For small q
where
45The Mellin Transform
Poles at 0, -1, -2, -3, and
46Complex poles
0
-1
-2
-3
47Mellin transform
48Approximation
where p 1-q
49Asymptotic
EC/ER
1.2451134
3log2 4/3
1.2451114
p
50Average-case analysis
- R - number of revoked users
- C number of sets in the cover
- If a user is revoked with probability p1
- EC 1.24511 ER
51Knuth and de Bruijn
- Solution communicated by de Bruijn to Knuth for
analysis of the radix-exchange sort algorithm
(vol. 3, 1st ed, p. 131) - De Bruijn, Knuth, Rice, The average height of
planted plane trees, 1972
52Further reading
- Flajolet, Gourdon, Dumas, Mellin transform and
asymptotics Harmonics sums, Theor. Comp. Sc.,
123(2), 1994
53Back-up slides
54Halevy-Shamir scheme
- Noticed that subtree differences are decomposable
55Halevy-Shamir scheme
- Fewer special sets reduce memory requirement on
receivers
56Improvement
- For practical parameters save additionally 20
compared to the Halevy-Shamir scheme