Paper 2023/1724

Accountability for Misbehavior in Threshold Decryption via Threshold Traitor Tracing

Dan Boneh, Stanford University
Aditi Partap, Stanford University
Lior Rotem, Stanford University
Abstract

A t-out-of-n threshold decryption system assigns key shares to n parties so that any t of them can decrypt a well-formed ciphertext. Existing threshold decryption systems are not secure when these parties are rational actors: an adversary can offer to pay the parties for their key shares. The problem is that a quorum of t parties, working together, can sell the adversary a decryption key that reveals nothing about the identity of the traitor parties. This provides a risk-free profit for the parties since there is no accountability for their misbehavior --- the information they sell to the adversary reveals nothing about their identity. This behavior can result in a complete break in many applications of threshold decryption, such as encrypted mempools, private voting, and sealed-bid auctions. In this work we show how to add accountability to threshold decryption systems to deter this type of risk-free misbehavior. Suppose a quorum of or more parties construct a decoder algorithm that takes as input a ciphertext and outputs the corresponding plaintext or . They sell to the adversary. Our threshold decryption systems are equipped with a tracing algorithm that can trace to members of the quorum that created it. The tracing algorithm is only given blackbox access to and will identify some members of the misbehaving quorum. The parties can then be held accountable, which may discourage them from selling the decoder in the first place. Our starting point is standard (non-threshold) traitor tracing, where parties each holds a secret key. Every party can decrypt a well-formed ciphertext on its own. However, if a subset of parties collude to create a pirate decoder that can decrypt well-formed ciphertexts, then it is possible to trace to at least one member of using only blackbox access to the decoder . Traitor tracing received much attention over the years and multiple schemes have been developed. In this work we develop the theory of traitor tracing for threshold decryption, where now only a subset of or more parties can collude to create a pirate decoder . This problem has recently become quite important due to the real-world deployment of threshold decryption in encrypted mempools, as we explain in the paper. While there are several non-threshold traitor tracing schemes that we can leverage, adapting these constructions to the threshold decryption settings requires new cryptographic techniques. We present a number of constructions for traitor tracing for threshold decryption, and note that much work remains to explore the large design space.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
A major revision of an IACR publication in CRYPTO 2024
Keywords
traitor tracingthreshold decryption
Contact author(s)
dabo @ cs stanford edu
aditi712 @ cs stanford edu
lrotem @ cs stanford edu
History
2024-08-17: last of 3 revisions
2023-11-07: received
See all versions
Short URL
https://ia.cr/2023/1724
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/1724,
      author = {Dan Boneh and Aditi Partap and Lior Rotem},
      title = {Accountability for Misbehavior in Threshold Decryption via Threshold Traitor Tracing},
      howpublished = {Cryptology {ePrint} Archive, Paper 2023/1724},
      year = {2023},
      url = {https://eprint.iacr.org/2023/1724}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.