Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders

In ACM-DRM 2001, Kiayias and Yung [19] introduced a classification of pirate decoders in the context of traitor tracing that put forth traceability against history recording and abrupt pirate decoders. History recording pirate decoders are able to maintain state during the traitor tracing process while abrupt decoders can terminate the tracing operation at will based on the value of a "React" predicate. Beyond this original work, subsequently a number of other works tackled the problem of designing traitor tracing schemes against such decoders but with very limited success. In this work, we present a new attack that can be mounted by abrupt and resettable decoders. Our attack defeats the tracing algorithm that was presented in [19] (which would continue to hold only for deterministic pirate decoders). Thus we show that contrary to what is currently believed there do not exist any known tracing procedures against abrupt decoders for general plaintext distributions. We also describe an attack that can be mounted by history recording (and available) decoders.

[1]  Douglas R. Stinson,et al.  Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.

[2]  Amos Fiat,et al.  Dynamic Traitor Tracing , 2001, Journal of Cryptology.

[3]  Serdar Pehlivanoglu,et al.  On the security of a public-key traitor tracing scheme with sublinear ciphertext size , 2009, DRM '09.

[4]  Pil Joong Lee,et al.  Advances in Cryptology — ASIACRYPT 2001 , 2001, Lecture Notes in Computer Science.

[5]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[6]  Robin Milner,et al.  On Observing Nondeterminism and Concurrency , 1980, ICALP.

[7]  Kaisa Nyberg,et al.  Advances in Cryptology — EUROCRYPT'98 , 1998 .

[8]  Amos Fiat,et al.  Broadcast Encryption , 1993, CRYPTO.

[9]  Aggelos Kiayias,et al.  On Crafty Pirates and Foxy Tracers , 2001, Digital Rights Management Workshop.

[10]  Matthew K. Franklin,et al.  An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.

[11]  Hideki Imai,et al.  A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates , 2004, ASIACRYPT.

[12]  Mihir Bellare Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.

[13]  Reihaneh Safavi-Naini,et al.  Sequential Traitor Tracing , 2000, CRYPTO.

[14]  Aggelos Kiayias,et al.  Scalable public-key tracing and revoking , 2003, PODC.

[15]  Jessica Staddon,et al.  Efficient Methods for Integrating Traceability and Broadcast Encryption , 1999, CRYPTO.

[16]  David Pointcheval,et al.  Public Traceability in Traitor Tracing Schemes , 2005, EUROCRYPT.

[17]  Brent Waters,et al.  A fully collusion resistant broadcast, trace, and revoke system , 2006, CCS '06.

[18]  Brent Waters,et al.  Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.

[19]  Moni Naor,et al.  Traitor tracing with constant size ciphertext , 2008, CCS.

[20]  Ronald Cramer,et al.  Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.

[21]  Nuttapong Attrapadung,et al.  Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys , 2007, ICALP.

[22]  Serdar Pehlivanoglu,et al.  Improving the Round Complexity of Traitor Tracing Schemes , 2010, ACNS.

[23]  Reihaneh Safavi-Naini,et al.  Traitor Tracing for Shortened and Corrupted Fingerprints , 2002, Digital Rights Management Workshop.

[24]  Aggelos Kiayias,et al.  Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.

[25]  Hugo Krawczyk,et al.  Advances in Cryptology - CRYPTO '98 , 1998 .

[26]  Yvo Desmedt,et al.  Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.

[27]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[28]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[29]  Moni Naor,et al.  Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.

[30]  Serge Vaudenay,et al.  Advances in Cryptology - EUROCRYPT 2006 , 2006, Lecture Notes in Computer Science.

[31]  Ronald Cramer,et al.  Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.

[32]  Dongvu Tonien,et al.  Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability , 2006, ICALP.

[33]  Aggelos Kiayias,et al.  Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.

[34]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[35]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[36]  Moni Naor,et al.  Threshold Traitor Tracing , 1998, CRYPTO.

[37]  Yvo Desmedt,et al.  Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.

[38]  MoonShik Lee,et al.  Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size , 2009, ACNS.