CRYPTO 2001: Advances in Cryptology — CRYPTO 2001 pp 63-79 | Cite as
Self Protecting Pirates and Black-Box Traitor Tracing
Abstract
We present a new generic black-box traitor tracing model in which the pirate-decoder employs a self-protection technique. This mechanism is simple, easy to implement in any (software or hardware) device and is a natural way by which a pirate (an adversary) which is black-box accessible, may try to evade detection. We present a necessary combinatorial condition for black-box traitor tracing of self-protecting devices. We constructively prove that any system that fails this condition, is incapable of tracing pirate-decoders that contain keys based on a superlogarithmic number of traitor keys. We then combine the above condition with specific properties of concrete systems. We show that the Boneh-Franklin (BF) scheme as well as the Kurosawa-Desmedt scheme have no black-box tracing capability in the self-protecting model when the number of traitors is superlogarithmic, unless the ciphertext size is as large as in a trivial system, namely linear in the number of users. This partially settles in the negative the open problem of Boneh and Franklin regarding the general black-box traceability of the BF scheme: at least for the case of superlogarithmic traitors. Our negative result does not apply to the Chor-Fiat-Naor (CFN) scheme (which, in fact, allows tracing in our self-protecting model); this separates CFN black-box traceability from that of BF. We also investigate a weaker form of black-box tracing called single-query “black-box confirmation.” We show that, when suspicion is modeled as a confidence weight (which biases the uniform distribution of traitors), such single-query confirmation is essentially not possible against a self-protecting pirate-decoder that contains keys based on a superlogarithmic number of traitor keys.
Keywords
User Population Concrete System Overwhelming Probability Probabilistic Polynomial Time Broadcast EncryptionReferences
- [BF99]Dan Boneh and Matthew Franklin, An Efficient Public Key Traitor Tracing Scheme, CRYPTO 1999.Google Scholar
- [BF01]Dan Boneh and Matthew Franklin, An Efficient Public Key Traitor Tracing Scheme, manuscript, full-version of [BF99], 2001.Google Scholar
- [CFN94]Benny Chor, Amos Fiat, and Moni Naor, Tracing Traitors, CRYPTO 1994.Google Scholar
- [CFNP00]Benny Chor, Amos Fiat, and Moni Naor, and Benny Pinkas, Tracing Traitors, IEEE Transactions on Information Theory, Vol. 46, no. 3, pp. 893–910, 2000. (journal version of [CFN94,NP98]).MATHCrossRefGoogle Scholar
- [DLN96]Cynthia Dwork, Jeff Lotspiech and Moni Naor, Digital Signets: Self-Enforcing Protection of Digital Content, STOC 1996.Google Scholar
- [FT99]Amos Fiat and T. Tassa, Dynamic Traitor Tracing, CRYPTO 1999.Google Scholar
- [GSY99]Eli Gafni, Jessica Staddon and Yiqun Lisa Yin, Efficient Methods for Integrating Traceability and Broadcast Encryption, CRYPTO 1999.Google Scholar
- [KD98]Kaoru Kurosawa and Yvo Desmedt, Optimum Traitor Tracing and Asymmetric Schemes, Eurocrypt 1998.Google Scholar
- [NP98]Moni Naor and Benny Pinkas, Threshold Traitor Tracing, CRYPTO 1998.Google Scholar
- [NP00]Moni Naor and Benny Pinkas, Efficient Trace and Revoke Schemes, In the Proceedings of Financial Crypto’ 2000, Anguilla, February 2000.Google Scholar
- [Pfi96]Birgit Pfitzmann, Trials of Traced Traitors, Information Hiding Workshop, Spring LNCS 1174, pp. 49–63, 1996.Google Scholar
- [PS96]Birgit Pfitzmann and Matthias Schunter, Asymmetric Fingerprinting, Eurocrypt 1996.Google Scholar
- [PW97]Birgit Pfitzmann and M. Waidner, Asymmetric fingerprinting for larger collusions, in proc. ACM Conference on Computer and Communication Security, pp. 151–160, 1997.Google Scholar
- [SW98a]Douglas Stinson and Ruizhong Wei, Key preassigned traceability schemes for broadcast encryption, In the Proceedings of SAC’98, Lecture Notes in Computer Science 1556, Springer Verlag, pp. 144–156, 1998.Google Scholar
- [SW98b]Douglas R. Stinson and R. Wei, Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes, SIAM J. on Discrete Math, Vol. 11, no. 1, 1998.Google Scholar