Abstract
A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption witht he capability of traitor tracing. Specifically, (1) a trusted center publishes a single public key and distributes individual secret keys to the users of the system; (2) anybody can encrypt a message so that all but a specified subset of “revoked” users can decrypt the resulting ciphertext; and (3) if a (small) group of users combine their secret keys to produce a “pirate decoder”, the center can trace at least one of the “traitors” given access to this decoder. We construct the first chosen ciphertext (CCA2) secure Trace and Revoke Scheme based on the DDH assumption. Our scheme is also the first adaptively secure scheme, allowing the adversary to corrupt players at any point during execution, while prior works (e.g., [14]
Of independent interest, we present a slightly simpler construction that shows a “natural separation” between the classical notion of CCA2- security and the recently proposed [15]
This proceedings version lacks most proof details; for a complete version see [7].
Chapter PDF
Similar content being viewed by others
References
J.H. An, Y. Dodis, and T. Rabin. On the Security of Joint Signature and Encryption. In Advances in Cryptology-EuroCrypt’ 02, pages 83–107, Berlin, 2002. Springer-Verlag. LNCS 2332. 100, 101, 103, 104
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A Concrete Security Treatment of Symmetric Encryption: Analysis of the DESModes of Operation. In Proceedings of the 38th Annual Symposium on Foundations of Computer Science-FOCS’ 97, pages 394–403, 1997. 104
D. Boneh. The Decision Diffie-Hellman Problem. In Algorithmic Number Theory-ANTS-III, pages 48–63, Berlin, 1998. Springer-Verlag. LNCS 1423. 102
B. Chor, A. Fiat, and N. Naor. Tracing Traitors. In Advances in Cryptology-Crypto’ 94, pages 257–270, Berlin, 1994. Springer-Verlag. LNCS 839. 102
R. Cramer and V. Shoup. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. In Advances in Cryptology-Crypto’ 98, pages 13–25, Berlin, 1998. Springer-Verlag. LNCS 1462. 101, 105, 107, 108, 111
R. Cramer and V. Shoup. Design and Analysis of Practical Public-Key Encryption Scheme Secure against Adaptive Chosen Ciphertext Attack. Manuscript, 2001. 101, 103, 105, 107, 108, 111, 112
Y. Dodis and N. Fazio. Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. Full version of this paper, available at http://eprint.iacr.org/, 2002. 100, 107, 110, 111, 113, 114
A. Fiat and M. Naor. Broadcast Encryption. In Advances in Cryptology-Crypto’ 93, pages 480–491, Berlin, 1993. Springer-Verlag. LNCS 773. 100
E. Gafni, J. Staddon, and Y. L. Yin. Efficient Methods for Integrating Traceability and Broadcast Encryption. InAdvances in Cryptology-Crypto’ 99, pages 372–387, Berlin, 1999. Springer-Verlag. LNCS 1666. 102
A Garay, J. Staddon, and A. Wool. Long-Lived Broadcast Encryption. In Advances in Cryptology-Crypto 2000, pages 333–352, Berlin, 2000. Springer-Verlag. LNCS 1880. 100
D. Halevy and A. Shamir. The LSD Broadcast Encryption Scheme. In Advances in Cryptology-Crypto’ 02, pages 47–60, Berlin, 2002. Springer-Verlag. LNCS 2442. 100
M. Luby and J. Staddon. Combinatorial Bounds for Broadcast Encryption. In Advances in Cryptology-EuroCrypt’ 98, pages 512–526, Berlin, 1998. Springer-Verlag. LNCS 1403. 100
D. Naor, M. Naor, and J. Lotspiech. Revocation and Tracing Schemes for Stateless Receivers. In Advances in Cryptology-Crypto’ 01, pages 41–62, Berlin, 2001. Springer-Verlag. LNCS 2139. 100, 101
M. Naor and B. Pinkas. Efficient Trace and Revoke Schemes. In Financial Cryptography-FC 2000, pages 1–20, Berlin, 2000. Springer-Verlag. LNCS 1962. 100, 101, 102, 105
V. Shoup. A Proposal for an ISO Standard for Public-Key Encryption. Manuscript, 2001. 100, 101, 103
W.G. Tzeng and Z. J. Tzeng. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamics Shares. In Public Key Cryptography-PKC’ 01, pages 207–224, Berlin, 2001. Springer-Verlag. LNCS 1992. 100, 101, 102, 105, 107
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dodis, Y., Fazio, N. (2003). Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. In: Desmedt, Y.G. (eds) Public Key Cryptography — PKC 2003. PKC 2003. Lecture Notes in Computer Science, vol 2567. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36288-6_8
Download citation
DOI: https://doi.org/10.1007/3-540-36288-6_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00324-3
Online ISBN: 978-3-540-36288-3
eBook Packages: Springer Book Archive