How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services

We are researching 3D-image-display technology based on the principle of “integral photography.” With the integral method, natural 3D images can be viewed without using special glasses. Since this methodnamely, a “full parallax method”-generates a large number of viewpoint images in both the horizontal and vertical directions, a display device capable of displaying an extremely large number of pixels is required to create high-quality 3D images. However, in the case of an apparatus using only a single display device, the number of pixels is limited, so it is difficult to improve the quality of integral 3D images. In view of this issue, we prototyped a device that increases the number of pixels of the 3D image by combining (without gaps) the images of multiple liquid crystal displays (LCDs) by using a unique multi-image combining optical system (MICOS). The MICOS was designed to have excellent resolution characteristics (namely, a modulation transfer function (MTF) value of 13.7% with respect to the spatial frequency of the pixel pitch) and suppressed brightness unevenness generated according to the viewing direction. Multi-image combination using four LCDs with 8K dual-green (R, B, G1, and G2, each with 4K) resolution creates an integral 3D display equivalent to approximately 100,000 pixels, and in comparison with the case of using only one LCD, the number of pixels of the 3D image is increased by 5.66 times. How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E100-A, No.1, pp.34-49 (2017) Kazuto Ogawa, Goichiro Hanaoka*1 and Hideki Imai*2 *1 National Institute of Advanced Industrial Science and Technology; *2 The University of Tokyo

[1]  Aggelos Kiayias,et al.  On Crafty Pirates and Foxy Tracers , 2001, Digital Rights Management Workshop.

[2]  Tatsuaki Okamoto,et al.  Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..

[3]  Nuttapong Attrapadung,et al.  Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.

[4]  Brent Waters,et al.  Practical constructions and new proof methods for large universe attribute-based encryption , 2013, CCS.

[5]  Tatsuaki Okamoto,et al.  Fully Secure Unbounded Inner-Product and Attribute-Based Encryption , 2012, ASIACRYPT.

[6]  Hideki Imai,et al.  Content and Key Management to Trace Traitors in Broadcasting Services , 2015, STM.

[7]  Hideki Imai,et al.  Trade-Off Traitor Tracing , 2007, INDOCRYPT.

[8]  Kaoru Kurosawa,et al.  Linear Code Implies Public-Key Traitor Tracing , 2002, Public Key Cryptography.

[9]  Matthew K. Franklin,et al.  An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.

[10]  Yevgeniy Dodis,et al.  Public Key Broadcast Encryption for Stateless Receivers , 2002, Digital Rights Management Workshop.

[11]  Brent Waters,et al.  Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.

[12]  Douglas R. Stinson,et al.  Key Preassigned Traceability Schemes for Broadcast Encryption , 1998, Selected Areas in Cryptography.

[13]  Reihaneh Safavi-Naini,et al.  Sequential traitor tracing , 2003, IEEE Trans. Inf. Theory.

[14]  Hideki Imai,et al.  A secure traitor tracing scheme against key exposure , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[15]  Serdar Pehlivanoglu,et al.  Tracing and Revoking Pirate Rebroadcasts , 2009, ACNS.

[16]  Mark Zhandry,et al.  Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key , 2016, EUROCRYPT.

[17]  Reihaneh Safavi-Naini,et al.  New traitor tracing schemes using bilinear map , 2003, DRM '03.

[18]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[19]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[20]  Hideki Imai,et al.  A Trade-off Traitor Tracing Scheme , 2009, IEICE Trans. Inf. Syst..

[21]  David Pointcheval,et al.  Public Traceability in Traitor Tracing Schemes , 2005, EUROCRYPT.

[22]  Douglas R. Stinson,et al.  Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..

[23]  Hideki Imai,et al.  A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates , 2004, ASIACRYPT.

[24]  Hongxia Jin,et al.  Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack , 2007, ESORICS.

[25]  Hideki Imai,et al.  Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service , 2006, ACISP.

[26]  M. Kasahara,et al.  A New Traitor Tracing , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[27]  Aggelos Kiayias,et al.  Scalable public-key tracing and revoking , 2003, PODC.

[28]  Yvo Desmedt,et al.  Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.

[29]  David Pointcheval,et al.  Message-Based Traitor Tracing with Optimal Ciphertext Rate , 2012, LATINCRYPT.

[30]  Hideki Imai,et al.  Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[31]  Olivier Billet,et al.  A Traceable Block Cipher , 2003, ASIACRYPT.

[32]  Amos Fiat,et al.  Dynamic Traitor Tracing , 2001, Journal of Cryptology.

[33]  Amos Fiat,et al.  Dynamic Traitor Training , 1999, CRYPTO.

[34]  Moni Naor,et al.  Traitor tracing with constant size ciphertext , 2008, CCS.

[35]  Moni Naor,et al.  Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.

[36]  Moni Naor,et al.  Efficient Trace and Revoke Schemes , 2000, Financial Cryptography.

[37]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[38]  Gábor Tardos,et al.  Optimal probabilistic fingerprint codes , 2003, STOC '03.