Title
New traitor tracing schemes using bilinear map
Abstract
Mitsunari et al [15] presented a new traitor tracing scheme which uses Weil pairing in elliptic curves. To the best of our knowledge this is the first scheme that uses bilinear map. The claimed advantage of the scheme is that the ciphertext size is independent of the number of traitors. It is shown that the problem of constructing a pirate key by k colluders is as hard as the so-called "k-weak Diffie-Hellman problem".In this paper, we show an attack on this scheme in which traitors find a linear combination of their keys to construct a pirate key that can be used to decrypt the ciphertext. We identify a class of schemes, that includes MSK, with the property that correct tracing requires the ciphertext size to depend on the collusion threshold. We derive a lower bound on the size of the ciphertext that depends on the number of colluders.We propose a modification to MSK scheme, Scheme 1, which not only ensures constructing a pirate decoder is hard, but also has a number of significant advantages over the initial proposal. In particular, it is a public key traitor tracing scheme while the original scheme is a secret key traitor tracing scheme; it has a black box tracing algorithm while MSK scheme only has an open box tracing algorithm, and finally its security is provable (semantic secure against passive adversary) while there was no security proof for MSK.We also propose two other schemes based on bilinear pairing. Scheme~2, is a generic scheme and can be used with any linear error correcting code. Scheme~3 uses Shamir's secret sharing scheme and has the added property that the encrypted message can be targeted to a subset of users. This is by including user revocation property and allowing selected users to be revoked from the original set of users. We also give proof of security, similar to Scheme 1, and also a tracing algorithm for the two schemes. Finally we give an efficiency comparison for the three schemes against the most efficient schemes with similar security and traceability properties and show that all three schemes are the most efficient ones of their kind.
Year
DOI
Venue
2003
10.1145/947380.947389
Digital Rights Management Workshop
Keywords
Field
DocType
bilinear map,secret key traitor,generic scheme,security proof,public key traitor,msk scheme,original scheme,new traitor,ciphertext size,efficient scheme,pirate key,secret sharing scheme,it security,lower bound,semantic security,diffie hellman,public key,elliptic curve,error correction code
Bilinear map,Internet privacy,Secret sharing,Computer security,Computer science,Encryption,Theoretical computer science,Ciphertext,Traitor tracing,Public-key cryptography,Tracing,Weil pairing
Conference
ISBN
Citations 
PageRank 
1-58113-786-9
25
3.62
References 
Authors
18
3
Name
Order
Citations
PageRank
V. D. Tô1253.62
R. Safavi-Naini217317.60
F. Zhang3253.62