Self Protecting Pirates and Black-Box Traitor Tracing

  • Aggelos Kiayias
  • Moti Yung
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2139)

Abstract

We present a new generic black-box traitor tracing model in which the pirate-decoder employs a self-protection technique. This mechanism is simple, easy to implement in any (software or hardware) device and is a natural way by which a pirate (an adversary) which is black-box accessible, may try to evade detection. We present a necessary combinatorial condition for black-box traitor tracing of self-protecting devices. We constructively prove that any system that fails this condition, is incapable of tracing pirate-decoders that contain keys based on a superlogarithmic number of traitor keys. We then combine the above condition with specific properties of concrete systems. We show that the Boneh-Franklin (BF) scheme as well as the Kurosawa-Desmedt scheme have no black-box tracing capability in the self-protecting model when the number of traitors is superlogarithmic, unless the ciphertext size is as large as in a trivial system, namely linear in the number of users. This partially settles in the negative the open problem of Boneh and Franklin regarding the general black-box traceability of the BF scheme: at least for the case of superlogarithmic traitors. Our negative result does not apply to the Chor-Fiat-Naor (CFN) scheme (which, in fact, allows tracing in our self-protecting model); this separates CFN black-box traceability from that of BF. We also investigate a weaker form of black-box tracing called single-query “black-box confirmation.” We show that, when suspicion is modeled as a confidence weight (which biases the uniform distribution of traitors), such single-query confirmation is essentially not possible against a self-protecting pirate-decoder that contains keys based on a superlogarithmic number of traitor keys.

Keywords

User Population Concrete System Overwhelming Probability Probabilistic Polynomial Time Broadcast Encryption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [BF99]
    Dan Boneh and Matthew Franklin, An Efficient Public Key Traitor Tracing Scheme, CRYPTO 1999.Google Scholar
  2. [BF01]
    Dan Boneh and Matthew Franklin, An Efficient Public Key Traitor Tracing Scheme, manuscript, full-version of [BF99], 2001.Google Scholar
  3. [CFN94]
    Benny Chor, Amos Fiat, and Moni Naor, Tracing Traitors, CRYPTO 1994.Google Scholar
  4. [CFNP00]
    Benny Chor, Amos Fiat, and Moni Naor, and Benny Pinkas, Tracing Traitors, IEEE Transactions on Information Theory, Vol. 46, no. 3, pp. 893–910, 2000. (journal version of [CFN94,NP98]).MATHCrossRefGoogle Scholar
  5. [DLN96]
    Cynthia Dwork, Jeff Lotspiech and Moni Naor, Digital Signets: Self-Enforcing Protection of Digital Content, STOC 1996.Google Scholar
  6. [FT99]
    Amos Fiat and T. Tassa, Dynamic Traitor Tracing, CRYPTO 1999.Google Scholar
  7. [GSY99]
    Eli Gafni, Jessica Staddon and Yiqun Lisa Yin, Efficient Methods for Integrating Traceability and Broadcast Encryption, CRYPTO 1999.Google Scholar
  8. [KD98]
    Kaoru Kurosawa and Yvo Desmedt, Optimum Traitor Tracing and Asymmetric Schemes, Eurocrypt 1998.Google Scholar
  9. [NP98]
    Moni Naor and Benny Pinkas, Threshold Traitor Tracing, CRYPTO 1998.Google Scholar
  10. [NP00]
    Moni Naor and Benny Pinkas, Efficient Trace and Revoke Schemes, In the Proceedings of Financial Crypto’ 2000, Anguilla, February 2000.Google Scholar
  11. [Pfi96]
    Birgit Pfitzmann, Trials of Traced Traitors, Information Hiding Workshop, Spring LNCS 1174, pp. 49–63, 1996.Google Scholar
  12. [PS96]
    Birgit Pfitzmann and Matthias Schunter, Asymmetric Fingerprinting, Eurocrypt 1996.Google Scholar
  13. [PW97]
    Birgit Pfitzmann and M. Waidner, Asymmetric fingerprinting for larger collusions, in proc. ACM Conference on Computer and Communication Security, pp. 151–160, 1997.Google Scholar
  14. [SW98a]
    Douglas Stinson and Ruizhong Wei, Key preassigned traceability schemes for broadcast encryption, In the Proceedings of SAC’98, Lecture Notes in Computer Science 1556, Springer Verlag, pp. 144–156, 1998.Google Scholar
  15. [SW98b]
    Douglas R. Stinson and R. Wei, Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes, SIAM J. on Discrete Math, Vol. 11, no. 1, 1998.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Aggelos Kiayias
    • 1
  • Moti Yung
    • 2
  1. 1.Graduate CenterCUNYNYUSA
  2. 2.CertCoNYUSA

Personalised recommendations