A proven secure tracing algorithm for the optimal KD traitor tracing scheme (7 minutes for the Rump session)
نویسنده
چکیده
A (k, n)-traceability scheme is a scheme in which at least one traitor is detected from a pirate key if there are at most k traitors among n authorized users. It has four components: key generation, an encryption algorithm, a decryption algorithm and a tracing algorithm. Kurosawa and Desmedt found lower bounds on the size of keys and the size of ciphertexts of traceability schemes [1]. They also proposed two schemes, a one-time use (k, n)-traceability scheme (the KD one-time traceability scheme) which meets these bounds and a public key variant for multiple use (the KD public key traceability scheme) [1]. However, Stinson and Wei showed that the tracing algorithm of the KD schemes is subject to a linear attack. Boneh and Franklin pointed out the same attack independently. In this paper, we present a proven secure tracing algorithm for the KD onetime traceability scheme. It will trace not only the traitors who use the StinsonWei/Boneh-Franklin attack but also any other traitors. Since the KD one-time traceability scheme achieves the lower bounds of Kurosawa and Desmedt [1], our result implies that the bounds are tight and the scheme is optimum. The tracing algorithm consist of a TEST procedure and a TRACE procedure. TEST takes as input a set A of at most k users and will check if A ∩ C 6= ∅, where C is the set of (at most k) traitors. TRACE takes as input a set A with A ∩ C 6= ∅ and traces at least one traitor from A. Recently, the authors have proved that our new tracing algorithm also works for the KD public traceability scheme under the decision Diffie-Hellman assumption.
منابع مشابه
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
We proposed a new public-key traitor tracing scheme with revocation capability using the dynamic share and entity revocation techniques. The enabling block of our scheme is independent of the number of subscribers, but dependent on the collusion and revocation thresholds. Each receiver holds one decryption key only. Our traitor tracing algorithm works in a black-box way and is conceptually simp...
متن کاملA Lattice-Based Traitor Tracing Scheme
A traitor tracing scheme is a multi-receiver encryption scheme where malicious receiver coalitions aiming at building pirate decryption devices are deterred by the existence of a tracing algorithm: Using the pirate decryption device, the tracing algorithm can recover at least one member of the malicious coalition. All existing traitor tracing schemes rely either on rather inefficient generic co...
متن کاملGeneric Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability
In Eurocrypt 2005, Chabanne, Phan and Pointcheval introduced an interesting property for traitor tracing schemes called public traceability, which makes tracing a black-box public operation. However, their proposed scheme only worked for two users and an open question proposed by authors was to provide this property for multi-user systems. In this paper, we give a comprehensive solution to this...
متن کاملImproving the Boneh-Franklin Traitor Tracing Scheme
Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a static set of l legitimate users, then all traitors can be identified given the pirate key. In this paper we address three practicality and security issues of the Boneh-Franklin traitortracing scheme. In the first place, without ch...
متن کاملEfficient Traitor Tracing from Collusion Secure Codes
In this paper, we describe a new traitor tracing scheme which relies on Tardos’ collusion secure codes to achieve constant size ciphertexts. Our scheme is also equipped with a black-box tracing procedure against pirates that are allowed to decrypt with some (possibly high) error rate while keeping the decoders of the lowest possible size when using collusion secure codes, namely of size proport...
متن کامل