In this paper, we propose a generic method to transform a broadcast encryption scheme into a trace and revoke scheme. This transformation involves the utilization of a fingerprinting code over the underlying BE transmission. While fingerprinting codes have been used for constructing traitor tracing schemes in the past, their usage has various shortcomings such as the increase of the public key size with a linear factor in the length of the code. Instead, we propose a novel way to apply fingerprinting codes that allows for efficient parameters while retaining the traceability property. Our approach is based on a new property of fingerprinting codes we introduce, called public samplability.
We have instantiated our generic transformation with the BE schemes of [4, 13, 20] something that enables us to produce trace and revoke schemes with novel properties. Specifically, we show (i) a trace and revoke scheme with constant private key size and short ciphertext size, (ii) the first ID-based trace and revoke scheme, (iii) the first publicly traceable scheme with constant private key size and (iv) the first trace and revoke scheme against pirate rebroadcasting attack in the public key setting.
Category / Keywords: Digital rights management, broadcast encryption, traitor tracing, fingerprinting codes. Date: received 8 Sep 2012, last revised 6 May 2013 Contact author: muratak at cs bilkent edu tr Available format(s): PDF | BibTeX Citation Version: 20130506:193715 (All versions of this report) Short URL: ia.cr/2012/531 Discussion forum: Show discussion | Start new discussion