Black-box trace&revoke codes

Hung Q. Ngo, Duong Hieu Phan, David Pointcheval

Research output: Contribution to journalArticlepeer-review

Abstract

We address the problem of designing an efficient broadcast encryption scheme which is also capable of tracing traitors. We introduce a code framework to formalize the problem. Then, we give a probabilistic construction of a code which supports both traceability and revocation. Given N users with at most r revoked users and at most t traitors, our code construction gives rise to a Trace&Revoke system with private keys of size O((r+t)logN) (which can also be reduced to constant size based on an additional computational assumption), ciphertexts of size O((r+t)logN), and O(1) decryption time. Our scheme can deal with certain classes of pirate decoders, which we believe are sufficiently powerful to capture practical pirate strategies. In particular, our code construction is based on a combinatorial object called (r,s)-disjunct matrix, which is designed to capture both the classic traceability notion of disjunct matrix and the new requirement of revocation capability. We then probabilistically construct (r,s)-disjunct matrices which help design efficient Black-Box Trace&Revoke systems. For dealing with "smart" pirates, we introduce a tracing technique called "shadow group testing" that uses (close to) legitimate broadcast signals for tracing. Along the way, we also proved several bounds on the number of queries needed for black-box tracing under different assumptions about the pirate's strategies.

Original languageEnglish
Pages (from-to)418-448
Number of pages31
JournalAlgorithmica
Volume67
Issue number3
DOIs
Publication statusPublished - 1 Nov 2013
Externally publishedYes

Keywords

  • Broadcast encryption
  • Disjunct matrix
  • Shadow group testing
  • Traitor tracing

Fingerprint

Dive into the research topics of 'Black-box trace&revoke codes'. Together they form a unique fingerprint.

Cite this