increase in bandwidth and storage size. The computa-
tional inefficiency can be resolved by an introduction
of keyed hash-function. We also show that our con-
struction attains confidentiality and strong integrity in
the sense of forward security, even though one of the
MACs uses a constant key.
ORGANIZATION OF THIS PAPER. In Section 2 we
provide the background and previous works for the
topics discussed in this paper. In Section 3 we de-
scribe a naive construction based on previous tech-
niques, which assures confidentiality and strong in-
tegrity in the sense of forward security but is vulner-
able against the DoS attack. Then we provide an im-
proved construction in Section 4 with the MAC-then-
MAC structure, which resists against the DoS attack
without losing efficiency. Precise definitions of our
algorithms are given in Section 5. Sections 6 and 7 are
devoted for the security analysis of our scheme. Our
security proofs are conducted in the concrete secu-
rity model (Bellare et al., 1997). This model is more
suited to symmetric-key setting than the asymptotic,
polynomial-reduction security model, for in practice
a symmetric-key primitive is usually equipped with
a fixed security parameter. In Section 8 we discuss
practical instantiations of our construction. Section 9
concludes this paper.
2 PRELIMINARIES
RELATED WORKS. (Park et al., 2002) studies effi-
cient approaches for authentication in multicast, com-
bining a digital signature with other techniques. In
particular, their construction is robust against packet
loss and suited for authenticating real-time streamed
data (Golle and Modadugu, 2001). There are also
works that deal with efficient methods for key man-
agement (Wong et al., 2000). Among them, there
is an area called “broadcast encryption” (Naor et al.,
2001) which focuses on the confidentiality aspect
and gives efficient methods for key distribution and
mechanisms of traitor tracing. Practical services
that fit into this setting include the distribution of
copyright-protected materials. Lastly, we mention
the recent work (Ray et al., 2005) which gives an
RSA-based multicast scheme with an added feature of
anonymity. Most of the above works either depend on
asymmetric-key techniques or involve rather sophis-
ticated ways to manage secret keys, and converting
these mechanisms into the form of forward security
does not seem trivial. So we do not go into the details
here.
BASIC APPROACH (TWO-STAGE ENCRYPTION). In
this paper we adopt a straight-forward approach for
key distribution, as follows: We assume that the cen-
ter distributes an independently random secret-key k
u
to each user u prior to transmission of data. Then
the center uses a fresh, random session-key K for
each message m . m is encrypted via a symmetric-
key cipher E : {0, 1}
κ
E
× {0, 1}
∗
→ {0, 1}
∗
as c ←
E
K
(m), and K is encrypted via another symmetric-
key cipher
¯
E as
~
h ←
¯
E
~
k
(K) (here the vector no-
tations mean h
u
←
¯
E
k
u
(K) for each u), where
~
k = (k
u
)
u∈P
is the vector of long-lived secret keys
for the set P of permitted users. Then the encrypted
datum (c,
~
h) consisting of ciphertext and header is de-
livered to the permitted receivers. This two-stage en-
cryption improves the efficiency (as compared to en-
crypting the large message m with each k
u
) and at
least assures confidentiality. This method is suited for
a situation with a relatively small number of users and
provides a practically efficient solution as long as the
size of header
~
h is kept minimal.
PRACTICAL SERVICES. In multi-receiver scenario
considered in this paper, a user may be revoked or
re-joined upon the decision of the sender; the center
may update the list of recipients dynamically during a
sequence of transmissions. Practical services that fit
into this setting include the distribution of mail mag-
azine and the multicast of pay contents: A user may
wish to be unsubscribed from the mail magazine any
time during the service, or the service provider may
wish to default temporarily the transmission of con-
tents to those who have failed to pay.
AUTHENTICATED ENCRYPTION (“ENCRYPT-THEN-
MAC”). A mechanism of authenticated encryption
can be realized either by a dedicated scheme or by
a generic composition of a symmetric cipher and a
MAC (Bellare and Namprempre, 2000). Applica-
bility of dedicated schemes to multi-receiver setting
heavily depends on the structure of each scheme,
while the generic composition paradigm gives us scal-
ability. So we adopt the well-known “Encrypt-then-
MAC” composition (Bellare and Namprempre, 2000)
as our starting point.
STRONG INTEGRITY AND COUNTER. The traditional
notion of integrity deals with protecting data con-
tents from being modified. An appropriate usage of
a MAC would be adequate for this purpose. How-
ever, this does not suffice to guarantee the strong in-
tegrity required in practice, such as replay avoidance
and in-order packet delivery (Kohno et al., 2003). The
strong integrity is a highly desirable property in multi-
receiver services.
The strong integrity of a sequence of ciphertexts
can be assured in several ways. Among them is to as-
sign a counter (like the “sequence number” used in
SSL) to each ciphertext (Note that the counter can
be sent in the clear. Also note that the size of the
counter, which correspondingly establishes its range,
must be large enough to meet the security objectives.
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
142