Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1655048.1655050acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

On the security of a public-key traitor tracing scheme with sublinear ciphertext size

Published: 09 November 2009 Publication History

Abstract

Traitor tracing refers to a class of encryption schemes that can be used to deter key-leakage. They apply to a setting that involves many receivers, each one receiving a fingerprinted decryption key. If a set of malicious receivers (also known as traitors) constructs an illicit decoder then a tracing mechanism enables an authority to identify at least one of the traitors. The very first traitor tracing scheme that has sublinear ciphertext size and is capable of tracing unambiguously illicit decoders that may shut-down (or employ some sort of self-defensive mechanism that would be adverse to tracing) was proposed in AsiaCrypt 2004 by Matsushita and Imai.
In this work we demonstrate that this scheme is susceptible to an attack by an illicit decoder that not only evades tracing but results with high likelihood in the incrimination of an innocent user. Our attack is based on the fact that an illicit decoder can decompose a ciphertext to a set of components that can be submitted to a statistical test which distinguishes between tracing and regular system operation. The statistical distance between the two distributions converges to 1 as the number of traitors grows with an exponential rate in the number of traitors. After demonstrating our attack we also present a way to repair the construction as long as the traitors are not spaced too far apart in the user population. In particular we devise a transmission mechanism that eliminates the discrepancies between the tracing operation and the regular operation in the system and works against illicit decoders that are correct with sufficiently high probability.

References

[1]
D. Boneh and M. Franklin, An Efficient Public-Key Traitor Tracing Scheme, CRYPTO '99, LNCS 1666 Springer 1999. pp. 338--353.
[2]
B. Chor, A. Fiat, and M. Naor, Tracing Traitors, CRYPTO '94, LNCS 839 Springer 1994, pp. 257--270.
[3]
H. Chabanne, D. Hieu Phan and D. Pointcheval, Public Traceability in Traitor Tracing Schemes, EUROCRYPT 2005, LNCS 3494 Springer 2005, pp. 542--558.
[4]
D. Halevy and A. Shamir, The LSD Broadcast Encryption Scheme. CRYPTO 2002, LNCS 2442 Springer 2002, pp. 47--60.
[5]
A. Kiayias, M. Yung, Self Protecting Pirates and Black-Box Traitor Tracing. CRYPTO 2001, LNCS 2139 Springer 2001, pp. 63--79.
[6]
A. Kiayias, M. Yung: "On Crafty Pirates and Foxy Tracers", ACM CCS-8 Workshop DRM 2001, LNCS 2320, Springer Verlag, pp. 22--39, 2002.
[7]
K. Kurosawa and Y. Desmedt, Optimum Traitor Tracing and Asymmetric Schemes, EUROCRYPT '98 LNCS 1403, Springer 1998, pp. 145--157.
[8]
M. Lee, D. Ma, M. Seo: Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size. ACNS 2009: 238--252
[9]
T. Matsushita, H.Imai, A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. AsiaCrypt04, Lecture Notes in Computer Science 3329.
[10]
Tatsuyuki Matsushita, Hideki Imai: Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. ICICS 2006: 92--111.
[11]
D. Naor, M. Naor, and J. B. Lotspiech, Revocation and Tracing Schemes for Stateless Receivers, CRYPTO 2001, LNCS 2139 Springer 2001, pp. 41--62.
[12]
M. Naor and B. Pinkas, Threshold Traitor Tracing, CRYPTO '98, LNCS 1462 Springer 1998, pp. 502--517.
[13]
Satoshi Obana and Kaoru Kurosawa: Bounds and Combinatorial Structure of Multi-Receiver-Codes. Des. Codes Cryptography, volume 22 2001, pp. 47--63.

Cited By

View all
  • (2011)Attacking traitor tracing schemes using history recording and abrupt decodersProceedings of the 14th international conference on Information security10.5555/2051002.2051005(17-31)Online publication date: 26-Oct-2011
  • (2011)Attacking Traitor Tracing Schemes Using History Recording and Abrupt DecodersInformation Security10.1007/978-3-642-24861-0_2(17-31)Online publication date: 2011
  • (2010)Broadcast and Content DistributionHandbook of Financial Cryptography and Security10.1201/9781420059823-c6(133-159)Online publication date: 4-Aug-2010

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DRM '09: Proceedings of the nineth ACM workshop on Digital rights management
November 2009
104 pages
ISBN:9781605587790
DOI:10.1145/1655048
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 November 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. blackbox tracing
  2. public key cryptosystem
  3. traitor tracing

Qualifiers

  • Research-article

Conference

CCS '09
Sponsor:

Upcoming Conference

CCS '24
ACM SIGSAC Conference on Computer and Communications Security
October 14 - 18, 2024
Salt Lake City , UT , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2011)Attacking traitor tracing schemes using history recording and abrupt decodersProceedings of the 14th international conference on Information security10.5555/2051002.2051005(17-31)Online publication date: 26-Oct-2011
  • (2011)Attacking Traitor Tracing Schemes Using History Recording and Abrupt DecodersInformation Security10.1007/978-3-642-24861-0_2(17-31)Online publication date: 2011
  • (2010)Broadcast and Content DistributionHandbook of Financial Cryptography and Security10.1201/9781420059823-c6(133-159)Online publication date: 4-Aug-2010

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media