Paper 2024/179

Traitor Tracing without Trusted Authority from Registered Functional Encryption

Pedro Branco, Max-Planck Institute for Security and Privacy
Russell W. F. Lai, Aalto University
Monosij Maitra, Max-Planck Institute for Security and Privacy, Ruhr-Universität Bochum
Giulio Malavolta, Bocconi University, Max-Planck Institute for Security and Privacy
Ahmadreza Rahimi, Max-Planck Institute for Security and Privacy
Ivy K. Y. Woo, Aalto University
Abstract

Traitor-tracing systems allow identifying the users who contributed to building a rogue decoder in a broadcast environment. In a traditional traitor-tracing system, a key authority is responsible for generating the global public parameters and issuing secret keys to users. All security is lost if the \emph{key authority itself} is corrupt. This raises the question: Can we construct a traitor-tracing scheme, without a trusted authority? In this work, we propose a new model for traitor-tracing systems where, instead of having a key authority, users could generate and register their own public keys. The public parameters are computed by aggregating all user public keys. Crucially, the aggregation process is \emph{public}, thus eliminating the need of any trusted authority. We present two new traitor-tracing systems in this model based on bilinear pairings. Our first scheme is proven adaptively secure in the generic group model. This scheme features a transparent setup, ciphertexts consisting of $6\sqrt{L}+4$ group elements, and a public tracing algorithm. Our second scheme supports a bounded collusion of traitors and is proven selectively secure in the standard model. Our main technical ingredients are new registered functional encryption (RFE) schemes for quadratic and linear functions which, prior to this work, were known only from indistinguishability obfuscation. To substantiate the practicality of our approach, we evaluate the performance a proof of concept implementation. For a group of $L = 1024$ users, encryption and decryption take roughly 50ms and 4ms, respectively, whereas a ciphertext is of size 6.7KB.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint.
Contact author(s)
pedrodemelobranco @ gmail com
russell lai @ aalto fi
monosij maitra @ rub de
giulio malavolta @ hotmail it
ahmadrezar @ pm me
ivy woo @ aalto fi
History
2024-02-16: last of 2 revisions
2024-02-06: received
See all versions
Short URL
https://ia.cr/2024/179
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/179,
      author = {Pedro Branco and Russell W. F. Lai and Monosij Maitra and Giulio Malavolta and Ahmadreza Rahimi and Ivy K. Y. Woo},
      title = {Traitor Tracing without Trusted Authority from Registered Functional Encryption},
      howpublished = {Cryptology ePrint Archive, Paper 2024/179},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/179}},
      url = {https://eprint.iacr.org/2024/179}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.