Black-Box Trace&Revoke Codes

Abstract : We address the problem of designing an efficient broadcast encryption scheme which is also capable of tracing traitors. We introduce a code framework to formalize the problem. Then, we give a probabilistic construction of a code which supports both traceability and revocation. Given N users with at most r revoked users and at most t traitors, our code construction gives rise to a Trace&Revoke system with private keys of size O((r+t)logN) (which can also be reduced to constant size based on an additional computational assumption), ciphertexts of size O((r+t)logN), and O(1) decryption time. Our scheme can deal with certain classes of pirate decoders, which we believe are sufficiently powerful to capture practical pirate strategies. In particular, our code construction is based on a combinatorial object called (r,s)-disjunct matrix, which is designed to capture both the classic traceability notion of disjunct matrix and the new requirement of revocation capability. We then probabilistically construct (r,s)-disjunct matrices which help design efficient Black-Box Trace&Revoke systems. For dealing with "smart" pirates, we introduce a tracing technique called "shadow group testing" that uses (close to) legitimate broadcast signals for tracing. Along the way, we also proved several bounds on the number of queries needed for black-box tracing under different assumptions about the pirate's strategies.
Type de document :
Article dans une revue
Algorithmica, Springer Verlag, 2013, 67 (3), pp.418-448. 〈10.1007/s00453-012-9702-y〉
Liste complète des métadonnées
Contributeur : David Pointcheval <>
Soumis le : mercredi 12 décembre 2012 - 09:50:19
Dernière modification le : vendredi 25 mai 2018 - 12:02:05

Lien texte intégral




Hung Q. Ngo, Duong Hieu Phan, David Pointcheval. Black-Box Trace&Revoke Codes. Algorithmica, Springer Verlag, 2013, 67 (3), pp.418-448. 〈10.1007/s00453-012-9702-y〉. 〈hal-00763979〉



Consultations de la notice