Paper 2008/384

Improving the Boneh-Franklin Traitor Tracing Scheme

Pascal Junod, Alexandre Karlov, and Arjen K. Lenstra

Abstract

Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a static set of legitimate users, then all traitors can be identified given the pirate key. In this paper we address three practicality and security issues of the Boneh-Franklin traitor-tracing scheme. In the first place, without changing the original scheme, we modify its tracing procedure in the non-black-box model such that it allows identification of k traitors in time O~(k2), as opposed to the original tracing complexity O~(). This new tracing procedure works independently of the nature of the Reed-Solomon code used to watermark private keys. As a consequence, in applications with billions of users it takes just a few minutes on a common desktop computer to identify large collusions. Secondly, we exhibit the lack of practical value of list-decoding algorithms to identify more than traitors. Finally, we show that traitors can derive the keys of all legitimate users and we propose a fix to this security issue.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
Traitor tracing
Contact author(s)
pascal @ junod info
History
2008-09-14: received
Short URL
https://ia.cr/2008/384
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2008/384,
      author = {Pascal Junod and Alexandre Karlov and Arjen K.  Lenstra},
      title = {Improving the Boneh-Franklin Traitor Tracing Scheme},
      howpublished = {Cryptology {ePrint} Archive, Paper 2008/384},
      year = {2008},
      url = {https://eprint.iacr.org/2008/384}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.