Combinationbased broadcast encryption method

0Associated
Cases 
0Associated
Defendants 
0Accused
Products 
7Forward
Citations 
0
Petitions 
1
Assignment
First Claim
1. A broadcast encryption method comprising:
 generating, by a server, a base group of unique base values, each of the base values generated from a unique combination of integers among a plurality of different integers having values greater than 1, and assigning a first base value among the unique base values to a first user and a second base value among the unique base values to a second user;
generating first secret information and second secret information for the first user and the second user through calculations with key value information allocated to a corresponding user by using the first base value and the second base value as a base, respectively, and sending the secret information to the first user and the second user;
generating an inversebase parameter value through calculations with an integer used to produce the base group and key value information of the first user and the second user, and sending the produced inversebase parameter value and key value information to the first user and the second user; and
deriving a first group key and a second group key based on the key value information and the first secret information and the second secret information, respectively, encrypting a session key with the derived first group key and second group key and sending the encrypted session key encrypted with the derived first group key and the encrypted session key encrypted with the derived second group key to the first user and the second user, respectively.
1 Assignment
0 Petitions
Accused Products
Abstract
A combinationbased broadcast encryption method includes: assigning by a server a base group of different combinations to each user; producing and sending secret information for each user by using as a base the base group allocated to each user; producing and sending an inversebase parameter value through calculations with integers used to produce the base group and key value information of one or more privileged users; and deriving a group key by using the key value information of the privileged users, encrypting a session key by using the derived group key, and sending the encrypted session key to each user. Accordingly, each user is assigned a different base through a combination, thereby having security against collusion attacks.
8 Citations
View as Search Results
Key Sharing System  
Patent #
US 20110194698A1
Filed 10/21/2009

Current Assignee
Sony Corporation

Sponsoring Entity
Sony Corporation

METHOD FOR JOINING USER DOMAIN AND METHOD FOR EXCHANGING INFORMATION IN USER DOMAIN  
Patent #
US 20090198993A1
Filed 12/15/2008

Current Assignee
Helios Streaming LLC

Sponsoring Entity
Pantech Company

Method for joining user domain and method for exchanging information in user domain  
Patent #
US 8,856,510 B2
Filed 12/15/2008

Current Assignee
Helios Streaming LLC

Sponsoring Entity
Pantech Company

Restricting communications between subscriber machines  
Patent #
US 9,794,271 B2
Filed 10/29/2014

Current Assignee
ATT Mobility II LLC

Sponsoring Entity
ATT Mobility II LLC

Restricting communications between subscriber machines  
Patent #
US 10,110,615 B2
Filed 09/13/2017

Current Assignee
ATT Mobility II LLC

Sponsoring Entity
ATT Mobility II LLC

Abstraction and deabstraction of a digital data stream  
Patent #
US 10,148,285 B1
Filed 11/15/2012

Current Assignee
Erich Schmitt

Sponsoring Entity
Erich Schmitt

Restricting communications between subscriber machines  
Patent #
US 10,462,154 B2
Filed 10/01/2018

Current Assignee
ATT Mobility II LLC

Sponsoring Entity
ATT Mobility II LLC

Broadcast encryption  
Patent #
US 5,592,552 A
Filed 09/24/1994

Current Assignee
Algorithmic Research Limited

Sponsoring Entity
Algorithmic Research Limited

50 Claims
 1. A broadcast encryption method comprising:
generating, by a server, a base group of unique base values, each of the base values generated from a unique combination of integers among a plurality of different integers having values greater than 1, and assigning a first base value among the unique base values to a first user and a second base value among the unique base values to a second user; generating first secret information and second secret information for the first user and the second user through calculations with key value information allocated to a corresponding user by using the first base value and the second base value as a base, respectively, and sending the secret information to the first user and the second user; generating an inversebase parameter value through calculations with an integer used to produce the base group and key value information of the first user and the second user, and sending the produced inversebase parameter value and key value information to the first user and the second user; and deriving a first group key and a second group key based on the key value information and the first secret information and the second secret information, respectively, encrypting a session key with the derived first group key and second group key and sending the encrypted session key encrypted with the derived first group key and the encrypted session key encrypted with the derived second group key to the first user and the second user, respectively.  View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
 10. A broadcast encryption method comprising:
grouping, by a server, into a first group of users and a second group of users that receive a broadcast message, and assigning a first key value to a first user of the first group and a first user of the second group and second key value to a second user of the first group and a second user of the second group; generating a base group of unique base values for the first group and the second group, each of the base values generated from a unique combination of integers among a plurality of different integers having values greater than 1, and assigning a first base value among the unique base values to the first user of the first group and the first user of the second group and a second base value among the unique base values to the second user of the second group; generating first secret information for the first user of the first group and the first user of the second group and second secret information for the second user of the first group and the first user of the second group through calculations with key value information allocated to a corresponding user by using the first base value and the second base value as a base, and sending the secret information to the first user of the first group, the first user of the second group, the second user of the first group, and the second user of the second group; generating a first inversebase parameter value through calculations with a first integer used to produce the first base group, a second inversebase parameter value through calculations with a second integer used to produce the second base group, first key value information of the first user of the first group and the first user of the second group, and second key value information of the second user of the first group and the second user of the second group, sending the first inversebase parameter value and the first key information to the first user of the first group and the first user of the second group, and sending the second inversebase parameter value and the second key value information to the second user of the first group and the second user of the second group; and deriving a first group key based on the first key value information and the first secret information and the second group key based on the second key value information and the second secret information, encrypting a first session key with the first group key and a second session key with the second group key, sending the first session key to the first user of the first group and the first user of the second group, and sending the second session key to the second user of the first group and the second user of the second group.  View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
 25. A broadcast encryption method comprising:
receiving by a first user first secret information generated for the first user through calculations with first key value information allocated to the first user and receiving by a second user second secret information generated for the second user through calculations with second key value information allocated to the second user; receiving by the first user an inversebase parameter value and the first key value information, and receiving by the second user the inversebase parameter value and the second key value information; generating a first group key and a second group key by using the first secret information and second secret information, respectively; and decrypting, by a processor of the first user and the second user, a session key received from the server by using the first group key and the second group key, respectively, wherein the first secret information and the second secret information are generated from a base group of unique base values, each of the base values of the base group generated from a unique combination of integers among a plurality of different integers having values greater than 1, that includes a first base value assigned to the first user and a second base value assigned to the second user, and wherein the inversebase parameter value is generated through calculations with integers used to generate the base group and the key value information of the first user and the second user.  View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33)
 34. A broadcast encryption method comprising:
receiving by first of a first group of users and a first user of a second group of users from a server first secret information generated for the first user of the first group and the first user of the second group through calculations with first key value information, and receiving by a second user of the first group of users and a second user of the second group of users from the server second secret information generated for the second user of the first group and the second user of the second group through calculations with second key value information; receiving by the first user of the first group and the first user of the second group from the server a first inversebase parameter value and the first key value information, and receiving by the second user of the first group and the second user of the second group a second inversebase parameter value and the second key value information; generating a first group key and a second group key for each group based on the first secret information and second secret information, respectively; and decrypting, by a processor of the first user of the first group and the first user of the second group, a first session key received from the server based on the first group key, and decrypting by a processor of the second user of the second group and the second user of the second group, a second session key received from the server based on the second group key, wherein a first key value is assigned to the first user of the first group and the first user of the second group and a second key value is assigned to the second user of the first group and the second user of the second group, wherein the first secret information and the second secret information are generated from a base group of unique base values, each of the base values of the base group are generated for each group from unique combinations of integers among a plurality of different integers having values greater than 1, that includes a first base value assigned to the first user of the first group and the second user of the first group and a second base value assigned to the first user of the second group and the second user of the second group, and wherein the inversebase parameter value is generated through calculations with the integers used to generate the base group and the first and second key value information.  View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
 49. A broadcast encryption method comprising:
generating, by a server, a first base value as a first product of a first prime integer and a common prime integer and a second base value as a product of a second prime integer and the common prime integer; allocating a first random integer to a first user and allocating a second random integer to a second user; generating first secret key information of the first user from the first base value exponentially modified by the first random integer and generating second secret key information of the second user from the second base value exponentially modified by the second random value; transmitting the first secret key information to the first user and transmitting the second secret key information to the second user; generating a first inversebase parameter from the first base value and the first random integer and generating a second inversebase parameter from the second base value and the second random integer; transmitting the first inversebase parameter to the first user and transmitting the second inversebase parameter to the second user; encrypting a session key based on the first secret key information and encrypting the session key based on the second secret key information; and transmitting the encrypted session key to the first user and the second user.
 50. A broadcast encryption method comprising:
generating, by a server, secret key information K_{ij }of n users of a group L of the n users; and transmitting, by the server, the secret key information K_{ij }to the n users for calculating a group key value by eliminating a base group from the secret information K_{ij}, wherein K_{ij}≡
(O_{σ}_{ij(1) }. . . O_{σ}_{ij(d)}O)^{zx}^{i}^{y}(mod N),wherein O_{σ}_{ij}(1), . . . , O_{σ}_{ij}(d) is the base group produced from a combination of different prime integers, O is a prime integers different from the different prime integers, σ
_{ij }is an index of O, x_{i }is a random number that identifies the group L, z is a random integer, y_{j }is a distinct prime integer among the different integers, N is an RSA composite, d is a positive integer satisfying
1 Specification
This application claims priority from Korean Patent Application No. 2004117701, filed on Dec. 31, 2004, the entire contents of which are incorporated herein by reference.
1. Field of the Invention
The present invention relates a broadcast encryption method, and more particularly, to a broadcast encryption method being secure against collusion attacks.
2. Description of the Related Art
In general, the encryption systems are classified into a symmetric key (also referred to as a secret key) encryption system and an asymmetric key (also referred to as a public key) encryption system.
The symmetric key encryption system uses the same key for encryption and decryption. For example, if a sender converts an original message into an encrypted message through an encryption key and an encryption algorithm and sends the encrypted message to a receiver, the receiver converts the encrypted message into the original message by applying the same key to a decryption algorithm.
The receiver has to exchange keys safely prior to the encrypted communications, and a third party who attempts to view the encrypted communications can not view the original message without the keys that the sender and receiver have used. However, problems on key management and exchanges can occur since the number of keys to be managed accordingly increases if encrypted messages are to be sent to more parties.
Compared to the symmetric key encryption system, the asymmetric key encryption system is based on mathematical functions, in which there exists a pair of keys, wherein one of the keys is open to anyone else for its use, and the other key is kept secret. In here, the open key is referred to as a public key, and the secretlykept key is referred to as a private key.
In order for a sender and a receiver to perform encryption communications by using the public key, the sender first encrypts an original message by using a public key of the receiver to send the encrypted message to the receiver, and the receiver decrypts the encrypted message by using a private key of his own to obtain the original message. Even though someone gets an encrypted message on a network, data can be safely sent since the encrypted message can not be decrypted without the private key which is kept by its owner all the time and has no need to be open or sent to others.
On the other hand, the symmetric key (or cipher) is mainly used to encrypt or decrypt broadcast streams, because the encryption and decryption can be carried out very rapidly when the symmetric key is used and the symmetric key can be safely sent through a limited access system to which only authenticated are accessible.
Contents creators create various useful data such as audio and video data in a data transmission system based on general broadcast encryptions, and provide the created data with service providers. The service providers broadcast the data of the contents creators through various wire and wireless communication networks to authorized users such as smart home Digital Rights management (DRM) networks and mobile DRM networks.
For example, the service provider 100 can send data through satellites to users devices such as settop boxes coming with various satellite receivers, as well as send the data to mobile communication terminals through mobile communication networks. Further, the service provider 100 can send the data to various terminals on a smart home network through the Internet.
On the other hand, the service provider 100 encrypts the data by using broadcast encryption (BE) to prevent unauthorized users from using the data.
The security in such an encryption/decryption system mainly depends on a system for managing encryption keys. Further, methods for deriving keys is most important in such an encryption key management system. In addition, it is important to manage and update the derived encryption keys.
On the other hand, the data transmission method by using the public key is a method for sending data including key values of authorized users when data is sent. That is, data sent by the service provider 100 through broadcast/home networks contains a header portion having authentication information and an encrypted data portion having substantial data information.
Thus, the header portion contains a group identifier (ID) and key value information of authenticated users included in each authorized group so that, of plural users, data can be sent to only the users of the authorized groups.
Therefore, if data is encrypted and sent through a certificate revocation list/online certificate status protocol (CRL/OCSP) including a CRL and OCSP information, users receiving the data check their own key value information included in the header portion of the data, get authenticated in due course, and use their desired data.
On the other hand, the header portion in the broadcast encryption (BE) scheme contains only information of a group ID and a key value for a certain group. Thus, the privileged users of authenticated groups can use their own group key values in order to decrypt the received data into original data.
There exist methods disclosed in the “Broadcast Encryption” (Fiat et al., Crypto '"'"'93 LINCS vol. 839, pp 480491, which is, hereinafter, referred to as the “Fiat algorithm”) as the other methods for broadcasting encryption keys. The ‘Fiat algorithm’ proposes two basic broadcast encryption algorithms and an algorithm having higher security against collusion attacks.
Hereinafter, a brief description will provided for the Fiat algorithm. Coefficients are first defined as below for the description of the Fiat algorithm.
 U: Set of users with U=n
 P: Set of privileged users with U−P=r
 N: RSA composite
 y_{1}, . . . , y_{n}: Distinct primes
 usr_{i}: An user in U where 1≦i≦n
 O: A positive integer satisfying 1<0<N
The Fiat algorithm enables a server to produce system coefficients N, y_{1}, . . . , y_{n}, and O, of the defined coefficients, in the system initialization step, and discloses the coefficients N, y_{1}, . . . , y_{n}, of the system coefficients, in order for anyone to look them up. Further, if a user usr_{i }subscribes to services, the server carries out tasks as below:
1. assign a value y_{i }to a user usr_{i }
2. calculate secret information, u_{i}═O^{y}^{i}^{(mod N)}, of the user usr_{i }
3. send the calculated secret information safely to the user usr_{i }
The initialization and user subscription steps are completed through the above tasks. Now, if given a group of privileged users, P⊂U, a group key K_{p }for each user is expressed in Equation 1 as follows:
Users included in P can use the value u_{i }assigned from the server to calculate the group key K_{p }of Equation 1 by using Equation 2 as follows:
Unauthorized subscribers or revocaters who are not normal subscribers have, in the exponent part u_{i}, the distinct prime y_{i }not included in the exponent part of K_{p}, so the group key K_{p }can be calculated when the distinct prime y_{i }is eliminated from the exponent part.
However, the calculation is practically impossible due to a problem of ‘difficult prime factorization of N’. Thus, the broadcast encryption becomes possible for privileged users through the above method.
However, the above Fiat algorithm causes a serious security problem when two users, for example, usr_{1 }and usr_{2}, share the secret information each other. That is, since y_{i }and y_{j }are primes to each other, integers a and b satisfying ay_{i}+by_{j}=1 can be easily obtained. Therefore, the two users can obtain a value of O being the secret system information by using Equation 3 as below:
u_{i}^{a}u_{j}^{b}≡O^{ay}^{i}^{+by}^{j}=O(mod N) [Equation 3]
Thus, the unauthorized users can obtain the group key K_{p }in all circumstances by using the value of O. That is, if two malicious users collude with each other, the two basic algorithms cause the system to be insecure any further since the secret information of a server broadcasting contents is oozed out.
As above, systems referred to as “1resilient systems” are ones secure against one aggressive operator but not secure against two aggressive operators. On the other hand, the Fiat algorithm proposes a kresilient system based on the 1resilient system, but has a problem of high inefficiency.
The kresilient system is that receivers (t receivers at maximum) eliminate an arbitrary number of receivers colluding with one another. However, the method needs a relatively long message, a relatively many keys stored in a receiver, and morethanonce decryption operations by each receiver.
Further, the method does not take a stateless receiver scenario into consideration. There needs to avoid an assumption on how many receivers collude with one another. Further, the message size and the number of stored keys need to be minimized, and the decryption operations to be carried out by a receiver have to be minimized for optimal performance.
On the other hand, the other systems like the Fiat system do not provide the stateless receiver scenario, so that the other systems can not be effectively applied to the protection of contents on recording media.
According to an aspect of the present invention, there is provided a combinationbased broadcast encryption method, comprising steps of producing a base group through combinations of morethanone integers out of plural different integers, and assigning the base group of different combinations to each user; producing secret information for each user through calculations with key value information allocated to a corresponding user by using as a base the base group allocated to each user, and sending the produced secret information to each user; producing an inversebase parameter value through calculations with an integer used to produce the base group and key value information of one or more privileged users, and sending the produced inversebase parameter value to each user, in order for only the privileged users of plural users to eliminate the base group from the secret information; and deriving a group key by using the key value information of the privileged users, and encrypting a session key with the derived group key and sending the encrypted session key to each user.
The integers for producing the base group are coprimes.
The inversebase parameter value is calculated with one or more random numbers further included for security reasons.
Further, the one or more random numbers calculated in the inversebase parameter value are used for calculation for deriving the group key.
The server produces a serverown random value, and the secret information for each user is calculated with the produced server'"'"'s own random value included.
The one or more random numbers calculated in the inversebase parameter value is calculated with the server'"'"'s own random value, and then sent to each user.
The produced base of the secret information for each user contains a base group allocated to each user and a common integer commonly used for all users, and the group key is derived to have the base of the common integer.
The server sends, to each user, information of combinations for producing a corresponding base group.
The server sends information of a key value allocated to the user every time a broadcast message is sent.
According to an aspect of the present invention, there is provided a combinationbased broadcast encryption method, comprising steps of grouping by a server into plural groups one upper group of plural users receiving a broadcast message, and assigning a key value to corresponding users of each group; producing a base group for each group through combinations of morethanone integers of plural different integers, and assigning users of each group the base group produced through a different combination; producing an inversebase parameter value through calculations with integers used to produce the base group and key value information of one or more privileged users, and sending the produced inversebase parameter value to users of a corresponding group, in order for only the privileged users of the plural users to eliminate the base group from the secret information; and deriving a group key for each group with the key value information of the privileged users, encrypting a session key with the derived group key, and sending the encrypted session key to each user.
A random number is assigned to each group, and the random number is further included in calculating the secret information of each user to be sent to the users of each group.
A random number assigned to a corresponding group is further included in calculating the inversebase parameter value.
The group key for each group is calculated with a random number assigned to a corresponding group further included.
Integers for productions of the base group are coprimes.
The inversebase parameter value is calculated with one or more random numbers further included for security reasons.
One or more random numbers calculated in the inversebase parameter value are used to calculate for derivation of the group key.
The server produces a server'"'"'s own random number, and the produced serverown random number is further included in calculating the secret information for each user.
One or more random numbers calculated in the inversebase parameter value are calculated with the server'"'"'s own random number, and sent to each user.
The produced base of the secret information for each user contains a base group assigned to each user and a common integer commonly used for all users, and the group key is derived to have the base of the common integer.
The server sends, to each user, the information of combinations for producing a corresponding base group.
The server separately calculates an exponent part and a base part in calculating the inversebase parameter value, and separately sends the exponent part and base part of the calculated inversebase parameter value.
Each group is grouped to plural subgroups, a key value is assigned to users of each subgroup, and secret information for each user is produced through calculations with key value information assigned to users of each subgroup.
If there are no unauthorized users in a specific group of the groups, a separate key value assigned to each group is established as a group key to the corresponding group.
The server sends the key value information assigned to the users every time the server sends the broadcast message.
According to an aspect of the present invention, there is provided a combinationbased broadcast encryption method, comprising steps of producing a base group through combinations of morethanone integers of plural different integers, and allocating the base group produced through a different combination for each user; producing secret information for each user through calculations with a key value information allocated to a corresponding user by using as a base the base group allocated to each user, and receiving by each user the produced secret information for each user from a server; producing an inversebase parameter value through calculations with integers used to produce the base group and the key value information of one or more privileged users, and receiving by each of the users the produced inversebase parameter value from the server, in order for only the privileged users of plural users to eliminate the base group from the secret information; calculating a group key by using the secret information for each user received from the server and the inversebase parameter value; and decrypting a session key received from the server by using the calculated group key.
The integers for producing the base group are coprimes.
Further, the inversebase parameter value is calculated with one or more random numbers further included for security reasons.
In here, one or more random numbers calculated in the inversebase parameter value are used for calculations to derive the group key.
The server produces a server'"'"'s own random number, and the secret information for each user is calculated with the produced serverown random number included.
One or more random numbers calculated in the inversebase parameter value are calculated with the server'"'"'s own random number, and then received.
A base of the produced secret information for each user contains the base group assigned to each user and a common integer commonly used for all users, and the group key is derived by using the common integer as a base.
In here, each user receives, from the server, information of a combination for producing the corresponding base group.
The information of the key value assigned to each user is received from the server every time the broadcast message is sent.
According to an aspect of the present invention, there is provided a combinationbased broadcast encryption method, comprising steps of grouping into plural groups one upper group having plural users receiving a broadcast message, and assigning a key value to users of each group; producing a base group for each group through combinations of morethanone integers of plural different integers, and assigning each user of each group the base group produced through a different combination; producing secret information for each user through calculations with key value information assigned to users of each group by using as a base the base group assigned to each user, and receiving by each user from a server the produced secret information for each user; producing an inversebase parameter value through calculations with the integers used to produce the base group and the key value information of one or more privileged users of the plural users, and receiving the produced inversebase parameter value by users of each corresponding group from the server, in order for only the privileged users of the plural users to eliminate the base group from the secret information; calculating a group key for each group by using the secret information for each user received from the server and the inversebase parameter value; and decrypting a session key received from the server by using the calculated group key for each group.
A random number is assigned to each group, and the random number is further included in calculating the secret information of each user to be sent to the users of each group.
A random number assigned to the corresponding group is further included in calculating the inversebase parameter value.
The group key for each group is calculated with a random number assigned to the corresponding group further included.
Integers for productions of the base group are coprimes.
The inversebase parameter value is calculated with one or more random numbers further included for security reasons.
One or more random numbers calculated in the inversebase parameter value are used to calculate for derivation of the group key.
The server produces a server'"'"'s own random number, and the produced serverown random number is further included in calculating the secret information for each user.
One or more random numbers calculated in the inversebase parameter value are calculated with the server'"'"'s own random number, and received by each user.
A base of the produced secret information of each user contains a base group assigned to each user and a common integer commonly used for all users, and the group key is derived to have the base of the common integer.
Users of each group receive from the server the information of combinations for producing the corresponding base group.
An exponent part and a base part are separately calculated in calculating the inversebase parameter value, and the exponent part and base part of the calculated inversebase parameter value are each received from the server.
Each group is grouped to plural subgroups, a key value is assigned to corresponding users of each subgroup, and secret information for each user is produced through calculations with key value information assigned to the corresponding users of each subgroup.
If there are no unauthorized users in a specific group of the groups, a separate key value assigned to each group is established as a group key to the corresponding group.
The key value information assigned to the users is received from the server every time the server sends the broadcast message.
In the conventional Fiat algorithm as above, the secret information of u_{i}=O^{y}^{i}(mod N) that the Fiat algorithm provides to individual users contains one variable O and one equation. This enables the variable O to be calculated according to the theory, that is, the Information theory. However, if N is a composite number of two large primes, it is impossible to obtain the variable O according to the computation theory due to the difficulties of prime factorization. Considering the above, the Fiat algorithm can be referred to as the 1resilient system. On the contrary, if given the secret information u_{i }and u_{j }of two users as above, one variable and two equations are obtained, so it can not be said that the difficulties of prime factorization is applied even to here. Therefore, two substantially colluding users can easily calculate the variable O.
Since the Fiat algorithm has every user use the same base, that is, the variable O, the present invention assigns a different base to each user in order to overcome the exposure to collusion attacks. To do so, the present invention uses ‘combinations’. Further, an additional mechanism is proposed to deal with revocators according to a modified exemplary embodiment of the present invention.
The above and/or other aspects of the present invention will be more apparent by describing certain exemplary embodiments of the present invention with reference to the accompanying drawings, in which:
Hereinafter, description will be made on a method assigning a base to individual users according to the present invention.
First, C integers, O_{1}, . . . , O_{c}, have values larger than 1 but smaller than N (1<O_{s}<N), and satisfy gcd(Os,N)=1. The number of different combinations is _{C}C_{d }when d numbers are chosen from these C integers. Instead of a variable O as a base of the secret information of each user, d integers are multiplied to produce a base group, and the use of the produced base group, that is, O_{σi(1)}, . . . , O_{σi(d)}, enables a system to be secure against methods attacking the Fiat algorithm. However, the many multiplications of integers fail to guarantee security against a few users'"'"' collusions since more equations than the number of variables can be provided. Thus, enough equations should not be provided in order for security to be guaranteed. That is, preparations can be made against all possible attacks by avoiding the use of all _{C}C_{d }combinations.
Hereinafter, description will be made on a combinationbased broadcast encryption method according to the basic exemplary embodiment of the present invention.
Prior to description on a basic exemplary embodiment of the present invention, coefficients necessary for the description on the basic exemplary embodiment are defined as below.
 U: set of users with U=n
 P: set of privileged users with U−P=r
 N: RSA composite
 ω, ν: random numbers
 z: a large integer
 κ: a session key
 O: a positive integer satisfying 1<O<N
 O_{1}, . . . , O_{C}: positive integers satisfying 1<O_{S}<N and gcd(O_{S}, N)=1
 C, d: positive integers satisfying

 O_{1}, . . . , O_{C}: positive integers satisfying 1<O_{s}<N and gcd(O_{S}, N)=1

C ,d : positive integers satisfying

 usr_{i}: a user in U where 1≦i≦n.
 {σ_{i}(1), . . . , σ_{i}(d)}: a set of integers for usr_{i }where σ_{i }is an 11 map from {1, . . . , d} to {1, . . . , C}, σ_{i}(s)<σ_{i}(s+1) and σ_{i}'"'"'s are distinct.
 usr_{ij}: a user in U where 1≦i≦L, 1≦j≦1 and Ll=n.
 {σ_{ij}(1), . . . , σ_{ij}(d)}: a set of integer for usr_{ij }where σ_{ij }is an 11 map from {1, . . . , d} to {1, . . . , C}, σ_{ij}(s)<σ_{ij}(s+1) and σ_{ij}'"'"'s are distinct.
 usr_{ijk}: a user in U where 1≦i≦L, 1≦j≦1, 1≦k≦m and Llm=n.
where kεI⊂{1, . . . , m}: a set of integer for usr_{ijk }where σ^{I}_{ijk }is an 11 map from {1, . . . ,
 Ui: {usr_{ijk}εU1≦j≦l, 1≦k≦m}
 U_{ij}: {usr_{ijk}εU1≦k≦m}
 K_{i}: a secret key for usr_{i }for 1≦i≦n
 y_{1}, . . . , y_{n}: distinct primes
 K_{p}: group key for
In the conventional Fiat algorithm, O^{y}^{i }is used as user secret information so that a variable O becomes known, but the method according to the basic exemplary embodiment of the present invention can make up for the drawbacks to the disclosure of the variable O since a different value O_{σ}_{i}(1), . . . , O_{σ}_{i}(d) is assigned as a base to each user.
Hereinafter, description will be made on a broadcast encryption process according to the basic exemplary embodiment. The broadcast encryption process has a setup step of server initialization and users'"'"' subscription, a group key calculation step of calculating a group key shared between a server and privileged users in order to decrypt a session key, and an encrypted message broadcast step of assigning the session key.
On the other hand, in the setup step being the first step of the process determines a user'"'"' storage amount, and the group key calculation step being the second step determines a transmission rate and a calculation amount. The encrypted message broadcast step being the third step encrypts the session key with the shared group key, and sends the encrypted session key.
As above, the basic exemplary embodiment of the present invention uses O_{σ}_{i}(1), . . . , O_{σ}_{i}(d) as a base of private secret information to be stored for calculations of a group key for each user. In here, the bases for all users are assigned a different value. On the other hand, if the bases for users are different from one another, the group key calculation step in Equation 4 as follows is needed to calculate a group key.
In Equation 4, ω and ν are random numbers that a server generates at every transmission, and are values for preventing that plural collected group keys are used for collusion attacks. Further, ω and ν are values for preparing for attacks extracting secret information of a server by use of transmitted information O_{S}, together with secret information z of the server and transmitted information V.
First, the setup step as the first step is as below.
That is, a server generates N, yi, C, d, O, O_{S}, and σ_{i }as initial setup values for all users i and s. Next, the server generates K_{i }by using Equation 5 as follows to calculate a group key for each user.
In Equation 5, it can be seen that
is used, as above, as a base for the secret information K_{i }for each user, where
is a base group generated by using combinations of one or more integers of plural different integers (that is, coprimes), and each user has a different combination method. The combination method is identified by σ_{i }being an index of the above variable O. Further, the above variable O is one of the integers, and commonly included in the bases of all users. Therefore, each user calculates a group key value by eliminating the base group from the secret information through calculations to be later described.
For example, if combinations are made when d integers are selected from C integers, the _{C}C_{d }combinations become possible. The number of combinations is preferably set higher than the number of users. Therefore, a base group produced by using a different combination can be allocated to each user.
Further, the exponent part of the secret information K_{i }for each user becomes key value information y_{i }allocated to each user. The key value information can be shared with all users, but the secret information K_{i }is a value known only to corresponding users. On the other hand, the variable z included in the exponent part of the secret information is a server'"'"'s own random value generated by the server and added for security of the secret information.
Further, N, y_{i}, and σ_{i }are commonly provided to all users. The value of N is an RSA composite value of a considerably large number, and determines integer values of the variable O for the base in the range of the value N. The y_{i }denotes key value information allocated to each user as aforementioned, and the σ_{i }denotes information on combinations for producing the above base group.
Each user usr_{i }stores N, {y_{s}1≦s≠i≦n}, and σ_{i }that are commonly sent, including the value of K_{i}, from the server.
Therefore, the first step completely ends, and the second step is performed as below for group key calculations.
First, the server produces ω and ν, and calculates and broadcasts V by using Equation 6 as follows.
V≡νz^{−1}(mod φ(N)) [Equation 6]
Next, the server calculates and broadcasts Ō_{s }for 1≦s≦C by using Equation 7 as follows.
In here, the Ō_{s}, becomes an inversebase parameter value for eliminating a base group of the received secret information in order for each user to derive a group key.
In Equation 7, the inversebase parameter value has as a base each integer O_{s }used to produce the base group, and has an exponent part of key value information for each user allocated to all privileged users P.
Further, ω and ν applied respectively to the base and exponent parts of the inversebase parameter value are random numbers generated by the server, produced at every transmission in order for the inversebase parameter value to be safely sent for security reasons, and used for the calculations of the inversebase parameter value.
Further, the value ν is calculated together with the server'"'"'s own random value z as stated in Equation 6, and sent separately to all users.
On the other hand, the each user usr_{i }uses the values (that is, each user'"'"'s key value y_{i}, combination information σ_{i}, information on privileged users P, secret information K_{i}, inversebase parameter value Ō_{s}, and the like) broadcast from the server to calculate a group key value K_{p }by using Equation 8 as follows.
If the group key is calculated as in Equation 8, each user uses the calculated group key to decrypt a session key received from the server.
That is, the server derives the group key K_{p }by using Equation 4, encrypts the session key by using the derived group key, and sends the encrypted session key to each user. Each user decrypts E(K_{p}, k) received from the server by using the group key calculated in Equation 8 as stated above, and obtains the session key.
Table 1 as below shows performance analysis based on the method according to the basic exemplary embodiment of the present invention. In the performance analysis, an assumption is made that log N=1024, log k=128, log y_{j}=log y^{I}_{j}=b, r=2^{18}, n=2^{20}.
In Table 1, the basic exemplary embodiment of the present invention compensates for the collusion attack problem being the drawbacks of the conventional Fiat algorithm, accompanying a somewhat increased transmission rate. Therefore, five different exemplary embodiments of the present invention are disclosed as below to reduce transmission rate, storage amount, and calculation amount compared to the basic exemplary embodiment.
Hereinafter, the exemplary embodiments of the present invention will be each described with reference to the accompanying drawings.
The method according to the first exemplary embodiment of the present invention groups total users n (upper group) into L groups, allocates a large random number x_{i }to each group, and allocates 1(=n/L) primes to 1 users of each group, respectively, in order to compensate for the above basic exemplary embodiment and the Fiat algorithm basically requiring a lot of calculation and storage amounts. Each group uses the same prime, but is identified and kept secure by the secret information x_{i }of a server. Thus, the calculation and storage amounts are remarkably reduced.
Prior to description on the first exemplary embodiment of the present invention, definitions are made as below on coefficients necessary for the description of the first exemplary embodiment and the second exemplary embodiment to be later described.
 U set of users with U=n
 P set of privileged users with U−P=r
 N: RSA composite
 ω, ν: random numbers
 z: a large integer
 k: a session key
 O: a positive integer satisfying 1<O<N
 O_{i}, . . . , O_{C}: positive integers satisfying 1<O_{s}<N and gcd(O_{s}, N)=1.
 C, d: positive integers satisfying

 O_{1}, . . . , O_{C}: positive integers satisfying 1<O_{s}<N and gcd(O_{s}, N)=1.

C ,d : positive integers satisfying

 usr_{i}: a user in U where 1≦i≦n.
 {σ_{i}(1), . . . , σ_{i}(d)}: a set of integer for usr_{i }where σ_{i }is an 11 map from {1, . . . , d} to {1, . . . , C}, σ_{i}(s)<σ_{i}(s+1) and σ_{i}'"'"'s are distinct.
 usr_{ij}: a user in U where 1≦i≦L, 1≦j≦1 and Ll=n.
 {σ_{ij}(1), . . . , σ_{ij}(d)}: a set of integers for usr_{ij }where σ_{ij}(s)<σ_{ij}(s+1) and σ_{ij}'"'"'s are distinct.
 usr_{ijk}: a user in U where 1≦i≦L, 1≦j≦1≦k≦m and Llm=n.
where kεI⊂{1, . . . , m}: A set of integer for usr_{ijk }where σ^{I}_{ijk }is an 11 map from {1, . . . ,
 U_{i}: {usr_{ijk}εU1≦j<l, 1≦k≦m}
 U_{ij}: {usr_{ijk}εU1≦k≦m}
 K_{ij}: a secret key for usr_{ij }for 1≦i≦L, 1≦j≦1 and Ll=n
 x_{i}, . . . , x_{L}: large integers
 y_{i}, . . . . , y_{1}: distinct primes
 K_{p1}, . . . , K_{PL}: subgroup keys for
In here, 1 users constituting each of the groups is assigned 1=n/L primes y1, . . . , y1. That is, the basic exemplary embodiment of the present invention is applied to the L user sets each having the size of 1. By doing so, a different group key can be derived for each group. That is, six group keys can be derived at a maximum, and Equation 9 can be expressed for 1≦i≦L, as below.
In Equation 9, x_{i }denotes a random number used to identify individual groups. However, the bases for individual n users have to be differently established as in the basic exemplary embodiment for security reasons.
Hereinafter, description will be made on a broadcast encryption process according to the first exemplary embodiment of the present invention. The broadcast encryption process according to the first exemplary embodiment is divided into a setup step of server initialization and user subscription, a subgroup key calculation step of calculating a subgroup key shared between a server and privileged users in order to decrypt a session key, and an encrypted message broadcast step of assigning the session key.
On the other hand, of the process, the setup step being the first step determines a user'"'"'s storage amount, the subgroup key calculation step being the second step determines a transmission rate and a calculation amount. The encrypted message broadcast step being the third step encrypts a session key with the shared subgroup key and sends the encrypted session key.
In the setup step, the server produces N, x_{i}, y_{i}, C, d, O_{s}, and σ_{ij }for all i, j, and s, as initialization values. Next, the server produces secret information K_{ij }of each user of a corresponding group in order to calculate a group key for each user usr_{ij}, using Equation 10 as follows.
In
On the other hand, the server sends the produced value K_{ij }to individual users usr_{ij }through security channels. Here, N, y_{i}, and σ_{ij }for all i and j are provided.
Further, the individual users usr_{ij }store N, {y_{s}1≦s≠j≦l}, and σ_{ij}, including the value K_{ij }sent from the server.
The first exemplary embodiment uses values of integer combinations as bases of the secret information sent to the users of each group, as in the basic exemplary embodiment.
Thus, the first step completely ends, the second step is performed, as below, to calculate subgroup keys, that is, group keys for individual groups.
First, the server produces the ω and ν, calculates and broadcasts V by using Equation 6.
Next, the server calculates and broadcasts
for 1≦i≦L and 1≦s≦C, using Equation 11 as below.
In here, the
becomes an inversebase parameter value for eliminating a base group of the received secret information in order to derive a group key for each user.
In Equation 11, the inversebase parameter value has each integer O_{s }as a base used for producing the base group, and also has as exponent key value information of each user allocated to all privileged users P. In here, the first exemplary embodiment has the exponent part of the inversebase parameter value containing a random value x_{i }allocated to each group.
On the other hand, ω and ν calculated in the base and exponent parts of the inversebase parameter value are random values produced by the server as stated above in the basic exemplary embodiment, which are produced at every transmission to send the inversebase parameter value safely for security reasons and used in calculations of the inversebase parameter value.
Likewise, the value ν is calculated together with a server'"'"'s own random value z as stated in detail in Equation 6, and separately sent to all users.
On the other hand, each user usr_{ij }calculates a subgroup key value K_{pi }for each group i by using the values broadcast from the server and the stored values by using Equation 12.
If the group key is calculated as shown in Equation 12, each user decrypts the session key received from the server by using the calculated group key, that is, a subgroup key for each group.
That is, the server derives the group key K_{Pi }by use of Equation 9, encrypts a session key k with the derived group key, and sends E(K_{Pi}, k) to each user. As stated above, each user decrypts E(K_{Pi}, k) received from the server with the group key calculated in Equation 12, and obtains a session key.
Table 2 shows performance analysis based on the method according to the first exemplary embodiment of the present invention. In the performance analysis, an assumption will be made that log N=1024, log k=128, log y_{i}=log y^{I}_{j}=b, r=2^{18}, and n=2^{20}.
In Table 2, the first exemplary embodiment of the present invention groups individual users into L groups and derives a subgroup key for each group, so as to reduce the calculation and storage amounts.
The method according to a second exemplary embodiment of the present invention separately calculates and sends the exponent and base parts of the inversebase parameter value in order to reduce the increased transmission rate of the first exemplary embodiment. The base part is protected by the random numbers ω and ν, and the exponent part is protected by the server'"'"'s secret information xi and the random number ω. By doing so, the transmission rate can be reduced.
Hereinafter, description will be made of a broadcast encryption process according to the second exemplary embodiment of the present invention. The broadcast encryption process according to the second exemplary embodiment is divided into a setup step of server initialization and user subscription, a subgroup key calculation step of calculating a subgroup key shared between a server and privileged users in order to decrypt a session key, and an encrypted message broadcast step of assigning the session key.
On the other hand, of the process, the setup step being the first step determines a user'"'"'s storage amount, the subgroup key calculation step being the second step determines a transmission rate and a calculation amount. The encrypted message broadcast step being the third step encrypts a session key with the shared subgroup key and sends the encrypted session key.
First, the setup step as the first step is the same as in the first exemplary embodiment. Therefore, detailed description on the setup step will be omitted.
The first step completely ends, and the second step is performed, as below, to calculate subgroup keys.
First, the server produces the ω and ν, calculates and broadcasts V by using Equation 6.
Next, the server calculates and broadcasts the base part O_{s}^{−i }of the inversebase parameter value, using Equation 13 as follows.
Ō_{s}≡(ωO_{s}^{−1})^{νω}^{−1}(mod N) [Equation 13]
Further, the server calculates and broadcasts the exponent part e_{i }of the inversebase parameter value for 1≦i≦L by using Equation 14 as follows, according to the second exemplary embodiment of the present invention.
On the other hand, each user usr_{ij }calculates a subgroup key value K_{Pi }for each group i by using the values broadcast from the server and the stored values by using Equation 15 as below.
If the group key is calculated as shown in Equation 15, each user decrypts a session key received from the server by using the calculated group key.
That is, the server derives the group key K_{Pi }by use of Equation 9, encrypts a session key k with the derived group key, and sends E(K_{Pi}, k) to each user. As stated above, each user decrypts the E(K_{Pi}, k) received from the server with the group key calculated in Equation 15, and obtains the session key.
Table 3 shows performance analysis based on the method according to the second exemplary embodiment of the present invention. In the performance analysis, an assumption will be made that log N=1024, log k=128, log y_{i}=log y^{I}_{j}=b, r=2^{18}, and n=2^{20}.
In Table 3, the second exemplary embodiment of the present invention separately calculates the exponent and base parts of transmission data so as to remarkably reduce the transmission rate.
So far, description has been made on the first and second exemplary embodiments of the present invention with reference to
The method according to the third exemplary embodiment of the present invention groups an 1users'"'"' group obtained in the first exemplary embodiment into musers'"'"' groups again in order to reduce the calculation amount more than the above exemplary embodiments. As in the first exemplary embodiment, each of the L groups has a group key, but the third exemplary embodiment to be later discussed allocates an allocated prime to every m users.
Further, all subsets to an musers'"'"' set are assigned a prime in order that revocators can be dealt with in all possible circumstances, and a user additionally stores user'"'"'s secret information in all possible circumstances. Therefore, there occurs an effect of reduction to onemth of the calculation amount.
Prior to the description of the third exemplary embodiment of the present invention, definitions are made as below on coefficients necessary for the description of the third exemplary embodiment and the fourth and fifth exemplary embodiments to be later described.
 U: set of users with U=n
 P: set of privileged users with U−P=r
 N: RSA composite
 ω, ν: random numbers
 z: a large integer
 k: a session key
 O: a positive integer satisfying 1<O<N
 O_{1}, . . . , O_{C}: positive integers satisfying 1<O_{s}<N and gcd(O_{s}, N)=1.
 C, d: positive integers satisfying

 O_{1}, . . . , O_{C}: positive integers satisfying 1<O_{s}<N and gcd(O_{s}, N)=1.

C ,d : positive integers satisfying

 usr_{i}: a user in U where 1≦i≦n.
 {σ_{i}(1), . . . , σ_{i}(d)}: a set of integer for usr_{i }where σ_{i }is an 11 map from {1, . . . , d} to {1, . . . , C}, σ_{i}(s)<σ_{i}(s+1) and σ_{i}'"'"'s are distinct.
 usr_{ij}: a user in U where 1≦i≦L, 1≦j≦1 and Ll=n. {σ_{ij}(1), . . . , σ_{ij}(d)}: A set of integers for usr_{ij }where σ_{ij }is an 11 map from {1, . . . , d} to {1, . . . , C}, σ_{ij}(s)<σ_{ij}(s+1) and σ_{ij}'"'"'s are distinct.
 usr_{ijk}: a user in U where 1≦i≦L, 1≦j≦1, 1≦k≦m and Llm=n.
where kεI⊂{1, . . . , m}: a set of integer for usr_{ijk }where σ^{I}_{ijk }is an 11 map from {1, . . . ,
 U_{i}: {usr_{ijk}εU1≦j≦1, 1≦k≦m}
 U_{ij}: {usr_{ijk}εU1≦k≦m}
 K_{ij}^{I}: where I⊂{1, . . . , m}: A secret key for usr_{ijk }for 1≦i≦L, 1≦j≦1 and Llm=n
 x_{i}, . . . , x_{L}: large integers
 y^{I}_{j}: distinct primes for 1≦j≦1 and nonempty subset I of {1, . . . , m}(where y^{Φ}_{j}=1)
 I_{ij}={kusr_{ijk}εP∩U_{ij}}
 K_{P1}, . . . , K_{PL}: subgroup keys for
Further, all subsets to an musers'"'"' set are assigned a prime in order that revocators can be dealt with in all possible circumstances, and a user additionally stores user'"'"'s secret information in all possible circumstances. On the other hand, the group key can be derived in Equation 16 as below according to the third exemplary embodiment of the present invention.
Hereinafter, description will be made on a broadcast encryption process according to the third exemplary embodiment of the present invention. The broadcast encryption process according to the third exemplary embodiment is divided into a setup step of server initialization and user subscription, a subgroup key calculation step of calculating a subgroup key shared between a server and privileged users in order to decrypt a session key, and an encrypted message broadcast step of assigning the session key.
On the other hand, of the process, the setup step being the first step determines a user'"'"'s storage amount, the subgroup key calculation step being the second step determines a transmission rate and a calculation amount. The encrypted message broadcast step being the third step encrypts a session key with the shared subgroup key and sends the encrypted session key.
In the setup step, the server produces N, x_{i}, y^{I}_{i},
The server sends the produced user'"'"'s secret information value K^{I}_{ijk }to individual users usr_{ijk }through security channels. In here, N, y^{I}_{j}, and σ^{I}_{ijk }for all i, j, and k are provided.
Further, the individual users usr_{ijk }store N, {y^{I}_{s}, 1≦s≠j<1, all I}, and σ^{I}_{ijk }for all I including the value k, including a {K^{I}_{ijk}all I including k} value sent from the server.
Thus, the first step completely ends, the second step is performed, as below, to calculate subgroup keys.
First, the server produces the ω and ν, and calculates and broadcasts V by Equation 6.
Next, the server calculates and broadcasts the base part Ō_{s }of the inversebase parameter value for 1≦s≦
Ō≡(ωO_{s}^{−1})^{νω}^{−1}(mod N) [Equation 18]
Further, the exponent part e_{i }of the inversebase parameter value is calculated and broadcast for 1≦i≦L by using Equation 19 according to the third exemplary embodiment of the present invention.
On the other hand, each user usr_{ijk }calculates a subgroup key value K_{Pi }of each subgroup by using Equation 20 as below, using the values broadcast from the server and the stored values.
If a group key is calculated in Equation 20, each user decrypts a session key received from the server by using the calculated group key, that is, the subgroup key for each group.
That is, the server derives a group key K_{Pi }by using Equation 16, and encrypts the session key k with the derived group key and sends E(K_{Pi}, k) to each user. In here, each user decrypts the E(KPi, k) received from the server by using the group key calculated by using Equation 20 and obtains the session key, as above.
Table 4 shows performance analysis based on the method according to the third exemplary embodiment of the present invention. In the performance analysis, an assumption will be made that log N=1024, log k=128, log y_{i}=log y^{I}_{j}=b, r=2^{18}, and n=2^{20}.
In Table 4, the third exemplary embodiment of the present invention can reduce the number of primes used as power of exponent by users in order to reduce the calculation amounts of the above exemplary embodiments. That is, as stated above, each of L groups is regrouped into musers groups. Therefore, n musers groups become an n/Lusers'"'"' group, and there exist L groups as such groups as above, accordingly. As a result, maximum (n/L)/m−1 primes can be used instead of maximum n/L−1 primes as a power of exponent in the second exemplary embodiment. To do this, there has to be primes corresponding to all subsets rather than a null set of musers'"'"' groups, so that the calculation amount as above can be remarkably reduced. That is, when m has a value ranging from 2 to 6, the calculation amount can be remarkably reduced. Further, since the number of primes only increases, any problem for security does not occur.
The fourth exemplary embodiment of the present invention can reduce the transmission amount further by enabling a corresponding group to share information that a server produces and users share, if there is no revocators from specific groups of the L groups in the third exemplary embodiment.
Therefore, a subgroup key value can be defined as in Equation 21 in the fourth exemplary embodiment and the fifth exemplary embodiment, which will be later discussed, of the present invention.
Hereinafter, description will be made on a broadcast encryption process according to the fourth exemplary embodiment of the present invention. The broadcast encryption process according to the fourth exemplary embodiment is divided, like the basic exemplary embodiment, into a setup step of server initialization and user subscription, a subgroup key calculation step of calculating a subgroup key shared between a server and privileged users in order to decrypt a session key, and an encrypted message broadcast step of assigning the session key.
In the setup step, the server produces N, x_{i}, y^{I}_{i},
Further, in the fourth exemplary embodiment of the present invention, the server additionally produces information K_{U}_{i }produced by the server and shared by users for all i.
The server sends the produced values K^{I}_{ijk }and K_{U}_{i }to individual users usr_{ijk }for all I including k through security channels. Here, N, y^{I}_{j}, and σ^{I}_{ijk }for all i, j, I, and k are provided.
Further, the individual users usr_{ijk }store K_{U}_{i}, N, {y^{I}_{s}1≦s≠j≦1, all I)}, and σ^{I}_{ijk }for all I including the value k, including a value {K^{I}_{ijk}all I including k} sent from the server.
Thus, the first step completely ends, the second step is performed, as below, to calculate a subgroup key.
First, the server produces the ω and ν, and calculates and broadcasts V by using Equation 6.
Next, the server calculates and broadcasts the base part Ō_{s }of the inversebase parameter value for 1≦s≦
Next, if U_{i }does not belong to P for 1≦i≦L, that is, there exist revocators in a specific group, according to the fourth exemplary embodiment of the present invention, the exponent part e_{i }is calculated and broadcast for 1≦i≦L by Equation 19 of the third exemplary embodiment of the present invention.
Thus, each user usr_{ijk }of a group received with e_{i }since U_{i }does not belong to P calculates a subgroup key value K_{Pi }of each subgroup by using Equation 20, using the values broadcast from the server and the stored values. On the other hand, if there does not exist revocators in a specific group of the L groups, the value K_{U}_{i }is used which is produced in the first step and shared with users.
In here, the 1bit field 504 denoting whether to belong to P out of one small user group U_{ij }is 0 therein if belonging to P out of one small user group U_{ij}. Otherwise, the 1bit field 504 is 1. Further, the fields denoting used primes have numbers to the primes based on an index i.
Table 5 shows performance analysis based on the method according to the fourth exemplary embodiment of the present invention. In the performance analysis, an assumption will be made that log N=1024, log k=128, log y_{i}=log y^{I}_{j}=b, r=2^{18}, and n=2^{20}.
In Table 5, in the third exemplary embodiment, the transmission rate remains the same even when revocators are decreased, but, in the fourth exemplary embodiment, the transmission rate decreases when r<L at the maximum value thereof. The values in parentheses in the transmission rates of Table 5 become values when r approaches at 0.
In the third and fourth exemplary embodiments, users can store the prime y^{I}_{j }used for exponent computations as above, but the transmission rate does not increase greatly even though sent every time since the transmission rate is small. On the contrary, since the storage amount can be reduced, the fifth exemplary embodiment of the present invention proposes a method modified in a format of sending the prime y^{I}_{j }every time.
Hereinafter, description will be made on a broadcast encryption process according to the fifth exemplary embodiment of the present invention. The broadcast encryption process according to the fourth exemplary embodiment is divided, like the basic exemplary embodiment, into a setup step of server initialization and user subscription, a subgroup key calculation step of calculating a subgroup key shared between a server and privileged users in order to decrypt a session key, and an encrypted message broadcast step of assigning the session key.
In the setup step, the server produces N, x_{i}, y^{I}_{i},
The server sends the produced values K^{I}_{ijk }to individual users usr_{ijk }for all I including k through security channels. In here, N and σ^{I}_{ijk }for all i, j, I, and k are provided.
Further, the individual users usr_{ijk }store σ^{I}_{ijk }for all I including N and k, including a value {K^{I}_{ijk}all I including k} sent from the server.
Thus, the first step completely ends, and the second step is performed, as below, to calculate a subgroup key.
First, the server produces the ω and ν, and calculates and broadcasts V by using Equation 6.
Next, the server calculates and broadcasts the base part Ō_{s }of the inversebase parameter value for 1≦s≦
The server broadcasts y^{I}_{j }for all subsets I of 1≦j≦1 and {1, . . . , m} according to the fifth exemplary embodiment of the present invention.
If the subgroup key is calculated in the second step as above, the server encrypts the broadcast message by the subgroup key and sends the encrypted message to each user in the third step as in the above exemplary embodiments, and each user who receives the message decrypts the received message by the calculated group key.
That is, the server produces, encrypts a message k for each group by using the subgroup key K_{Pi}, and sends E(K_{Pi}, k) to each user. Each user decrypts the received E(KPi, k) by the calculated subgroup key value.
The performance analysis according to the fifth exemplary embodiment of the present invention is as below. An assumption will be made that log N=1024, log k=128, log y_{i}=log y^{I}_{j}=b, r=2^{8}, and n=2^{20}.
In Table 6, the fifth exemplary embodiment of the present invention can reduce the storage amount by sending the prime Y^{I}_{i }every time instead of storing the prime Y^{I}_{i }that is used for the exponent calculation in the third and fourth exemplary embodiments.
Hereinafter, description will be made, with reference to
Hereinafter, the present exemplary embodiments and prior art are compared in terms of performance by using graphs with reference to
As aforementioned, in order to overcome the disclosure of the conventional broadcast encryption method to collusion attacks, the present invention assigns each user a base of a different combination, thereby having an advantage of security. Further, the diverse exemplary embodiments of the present invention can remarkably reduce the storage amount, transmission rate, calculation amount, and so on, necessary for broadcast encryptions.
The foregoing exemplary embodiments and advantages are merely exemplary and are not to be construed as limiting the present invention. The present teaching can be readily applied to other types of apparatuses. Also, the description of the exemplary embodiments of the present invention is intended to be illustrative, and not to limit the scope of the claims, and many alternatives, modifications, and variations will be apparent to those skilled in the art.