Paper 2024/179
Traitor Tracing without Trusted Authority from Registered Functional Encryption
Abstract
Traitor-tracing systems allow identifying the users who contributed to building a rogue decoder in a broadcast environment. In a traditional traitor-tracing system, a key authority is responsible for generating the global public parameters and issuing secret keys to users. All security is lost if the \emph{key authority itself} is corrupt. This raises the question: Can we construct a traitor-tracing scheme, without a trusted authority?
In this work, we propose a new model for traitor-tracing systems where, instead of having a key authority, users could generate and register their own public keys. The public parameters are computed by aggregating all user public keys. Crucially, the aggregation process is \emph{public}, thus eliminating the need of any trusted authority. We present two new traitor-tracing systems in this model based on bilinear pairings. Our first scheme is proven adaptively secure in the generic group model. This scheme features a transparent setup, ciphertexts consisting of
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- A major revision of an IACR publication in ASIACRYPT 2024
- Contact author(s)
-
pedrodemelobranco @ gmail com
russell lai @ aalto fi
monosij @ cse iitkgp ac in
giulio malavolta @ hotmail it
ahmadrezar @ pm me
ivy woo @ aalto fi - History
- 2024-10-11: last of 4 revisions
- 2024-02-06: received
- See all versions
- Short URL
- https://ia.cr/2024/179
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/179, author = {Pedro Branco and Russell W. F. Lai and Monosij Maitra and Giulio Malavolta and Ahmadreza Rahimi and Ivy K. Y. Woo}, title = {Traitor Tracing without Trusted Authority from Registered Functional Encryption}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/179}, year = {2024}, url = {https://eprint.iacr.org/2024/179} }