Dynamic Fingerprinting over Broadcast Using Revocation Scheme

In this paper, we deal with the problem of how to embed unique fingerprints into broadcasted contents or packaged contents, such as CD and DVD, without giving the watermarking algorithm to the decoders at the receivers. We propose a new model using around-half-rate dynamic revocation scheme in broadcast encryption. Our model achieves the following properties: (1) No watermarking algorithm at the decoders; (2) Dynamic fingerprinting; and (3) Dynamic revocation. Revocation schemes allow a center to broadcast an encrypted message so that only a particular subset of the users can obtain the contents of the message. However, when dealing with around-half-rate revocation, most past proposed schemes failed to obtain a good efficiency, i.e. the message length that must be transmitted by the sender or the number of storage keys at a user is too large. In addition, we propose an efficient algorithm of revocation that reduces both the message length and the size of storage keys at a user while maintaining both collusion-freeness and a single decryption at a user.

[1]  Toru Fujiwara,et al.  An efficient traitor tracing scheme for broadcast encryption , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[2]  Amos Fiat,et al.  Dynamic Traitor Tracing , 2001, Journal of Cryptology.

[3]  Douglas R. Stinson,et al.  Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.

[4]  Tomoyuki Asano A Revocation Scheme with Minimal Storage at Receivers , 2002, ASIACRYPT.

[5]  Yuliang Zheng,et al.  Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.

[6]  Chi Sung Laih,et al.  Advances in Cryptology - ASIACRYPT 2003 , 2003 .

[7]  Kazukuni Kobara,et al.  Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes , 2003, ASIACRYPT.

[8]  Hirofumi Muratani A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience , 2001, Information Hiding.

[9]  Amos Fiat,et al.  Broadcast Encryption , 1993, CRYPTO.

[10]  Reihaneh Safavi-Naini,et al.  Sequential traitor tracing , 2003, IEEE Trans. Inf. Theory.

[11]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[12]  Adi Shamir,et al.  The LSD Broadcast Encryption Scheme , 2002, CRYPTO.

[13]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[14]  Moni Naor,et al.  Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.

[15]  Moti Yung,et al.  Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.

[16]  Aggelos Kiayias,et al.  Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.

[17]  Amos Fiat,et al.  Dynamic Traitor Training , 1999, CRYPTO.

[18]  Moni Naor,et al.  Efficient Trace and Revoke Schemes , 2000, Financial Cryptography.