Content and Key Management to Trace Traitors in Broadcasting Services

Traitor tracing encryption schemes are a type of broadcasting encryption and have been developed for broadcasting services. There are multiple distinct decryption keys for each encryption key, and each service subscriber is given a unique decryption key. Any subscriber that redistributes his or her decryption key to a third party or who uses it to make a pirate receiver $$\mathcal{PR}$$ can be identified using the schemes. However, almost all previous schemes are effective against only those $$\mathcal{PR}$$s with only one decryption key. We first discuss an attack content comparison attack against the above encryption schemes. The attack involves multiple distinct decryption keys and content-data comparison mechanism. We have developed a content and key management methodCKM that makes traitor tracing schemes secure against the content comparison attack. Its use makes it impossible for $$\mathcal{PR}$$s to distinguish ordinary content data from test data and makes traitor tracing schemes effective against all $$\mathcal{PR}$$s. The CKM makes the broadcasting services secure.

[1]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[2]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[3]  Moni Naor,et al.  Traitor tracing with constant size ciphertext , 2008, CCS.

[4]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[5]  Hideki Imai,et al.  A Trade-off Traitor Tracing Scheme , 2009, IEICE Trans. Inf. Syst..

[6]  Amos Fiat,et al.  Dynamic Traitor Tracing , 2001, Journal of Cryptology.

[7]  Gábor Tardos,et al.  Optimal probabilistic fingerprint codes , 2003, STOC '03.

[8]  Yvo Desmedt,et al.  Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.

[9]  David Pointcheval,et al.  Message-Based Traitor Tracing with Optimal Ciphertext Rate , 2012, LATINCRYPT.

[10]  Hideki Imai,et al.  Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[11]  M. Kasahara,et al.  A New Traitor Tracing , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[12]  Serdar Pehlivanoglu,et al.  Tracing and Revoking Pirate Rebroadcasts , 2009, ACNS.

[13]  Hongxia Jin,et al.  Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack , 2007, ESORICS.

[14]  Olivier Billet,et al.  Traitors Collaborating in Public: Pirates 2.0 , 2009, EUROCRYPT.

[15]  Aggelos Kiayias,et al.  On Crafty Pirates and Foxy Tracers , 2001, Digital Rights Management Workshop.

[16]  Tatsuaki Okamoto,et al.  Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..

[17]  Nuttapong Attrapadung,et al.  Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.

[18]  Moni Naor,et al.  Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.

[19]  Brent Waters,et al.  Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.

[20]  Reihaneh Safavi-Naini,et al.  Sequential traitor tracing , 2003, IEEE Trans. Inf. Theory.

[21]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[22]  Brent Waters,et al.  Practical constructions and new proof methods for large universe attribute-based encryption , 2013, CCS.

[23]  Tatsuaki Okamoto,et al.  Fully Secure Unbounded Inner-Product and Attribute-Based Encryption , 2012, ASIACRYPT.