[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/648118.746767guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Efficient Asymmetric Self-Enforcement Scheme with Public Traceability

Published: 13 February 2001 Publication History

Abstract

Traitor tracing schemes deter traitors from giving away their keys to decrypt the contents by enabling the data supplier to identify the source of a redistributed copy. In asymmetric schemes, the supplier can also convince an arbiter of this fact.
Another approach to the same goal was suggested by Dwork, Lotspiech and Naor, so called self-enforcement schemes. In these schemes, traitors have to either divulge their private sensitive information or distribute fairly large amount of data. However, the same private information must be revealed to the data supplier, which invokes the necessity of more discussion about the model underlying this scheme.
In this paper, we present an efficient asymmetric self-enforcement scheme, which also supports the asymmetric traceability without any trusted third parties, assuming the situation where the authenticity of the exponent of each subscriber's sensitive information bound to the subject entity is publicly certified, such as PKI derived from discrete logarithm based cryptosystems. In our scheme, the sensitive information needs not to be revealed to any entities. As far as we know, there has never been any proposal of asymmetric self-enforcement schemes. Furthermore, our scheme is as efficient as the previous most efficient symmetric or asymmetric traitor tracing schemes proposed so far.

References

[1]
M. Bellare and S. Micali, "Non-interactive oblivious transfer and applications," Advances in Cryptology - CRYPTO '89, LNCS 435, Springer-Verlag, pp. 547-557, 1990.
[2]
D. Bleichenbacher and P.Q. Nguyen, "Noisy Polynomial Interpolation and Noisy Chinese Remaindering," Advances in Cryptology - EUROCRYPT 2000, LNCS 1807, Springer-Verlag, pp. 53-69, 2000.
[3]
D. Boneh and M. Franklin, "An Efficient Public Key Traitor Tracing Scheme," Advances in Cryptology - CRYPTO '99, LNCS 1666, Springer-Verlag, pp. 338-353, 1999.
[4]
Burmester, Desmedt, Kurosawa, Ogata and Okada, manuscript.
[5]
B. Chor, A. Fiat and M. Naor, "Tracing Traitors," Advances in Cryptology - CRYPTO '94, LNCS 839, Springer-Verlag, pp. 257-270, 1994.
[6]
C. Dwork, J. Lotspiech and M. Naor, "Digital Signets: Self-Enforcing Protection of Digital Information," Proc. of 28th ACM Symposium on Theory of Computing (STOC), pp. 489-498, 1996.
[7]
P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis," Advances in Cryptology - CRYPTO '99, LNCS 1666, Springer-Verlag, pp. 388-397, 1999.
[8]
K. Kurosawa and Y. Desmedt, "Optimum Traitor Tracing and Asymmetric Schemes," Advances in Cryptology - EUROCRYPT '98, LNCS 1403, Springer-Verlag, pp. 145-157, 1998.
[9]
J.L. Massey, "Shift Register Synthesis and BCH Decoding," IEEE Transactions on Information Theory, vol. IT-15, No.1, pp. 122-127, January 1969.
[10]
M. Naor and B. Pinkas, "Oblivious Transfer and Polynomial Evaluation," Proc. of 31th ACM Symposium on Theory of Computing(STOC), pp. 245-254, 1999.
[11]
B. Pfitzmann, "Trials of Traced Traitors," Proc. of Information Hiding, First International Workshop, LNCS 1174, Springer-Verlag, pp. 49-64,1996.
[12]
B. Pfitzmann and M. Waidner, "Asymmetric Fingerprinting for Lager Collusions," Proc. of ACM Conference on Computer and Communication Security, pp. 151-160, 1997.
[13]
T. Sander and A. Ta-Shma, "Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems," Proc. of Financial Cryptography: Third International Conference, FC'99, LNCS 1648, Springer-Verlag, pp. 46-61, 1999.
[14]
D.R. Stinson and R. Wei, "Key Preassigned Traceability Schemes for Broadcast Encryption," Proc. of SAC '98, LNCS 1556, Springer-Verlag, pp. 144-156, 1998.
[15]
N.R. Wagner, "Fingerprinting," Proc. of IEEE 1983 Symposium on Security and Privacy, April, pp. 18-22, 1983.
[16]
Y. Watanabe, G. Hanaoka and H. Imai, "Asymmetric Public-Key Traitor Tracing without Trusted Agents," Proc. of the Symposium on Information Theory and Its Application (SITA 2000), October, 2000.
[17]
Y. Watanabe, G. Hanaoka and H. Imai, "Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents," to appear in Proc. of the RSA Conference Cryptographer's Track, April, 2001 (to be published in LNCS).
[18]
Y. Watanabe, H. Komaki, G. Hanaoka and H. Imai, "Asymmetric Traitor Tracing based on Oblivious Polynomial Evaluation," (in Japanese) IEICE Technical Report, ISEC, September, 2000.
[19]
S.B. Wicker, "Error Control Systems for Digital Communication and Storage," Prentice-Hall, Inc., 1995.

Cited By

View all
  • (2017)Hardness of k-LWE and Applications in Traitor TracingAlgorithmica10.1007/s00453-016-0251-779:4(1318-1352)Online publication date: 1-Dec-2017
  • (2013)How to keep a secretProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516691(943-954)Online publication date: 4-Nov-2013
  • (2010)Threat analysis of online health information systemProceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments10.1145/1839294.1839331(1-7)Online publication date: 23-Jun-2010
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
PKC '01: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
February 2001
421 pages
ISBN:3540416587

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 13 February 2001

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Hardness of k-LWE and Applications in Traitor TracingAlgorithmica10.1007/s00453-016-0251-779:4(1318-1352)Online publication date: 1-Dec-2017
  • (2013)How to keep a secretProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516691(943-954)Online publication date: 4-Nov-2013
  • (2010)Threat analysis of online health information systemProceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments10.1145/1839294.1839331(1-7)Online publication date: 23-Jun-2010
  • (2006)An efficient traitor tracing scheme based on MDS codeProceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services10.1145/1501434.1501475(1-5)Online publication date: 30-Oct-2006
  • (2004)Practical pay-TV scheme using traitor tracing scheme for multiple channelsProceedings of the 5th international conference on Information Security Applications10.1007/978-3-540-31815-6_22(264-277)Online publication date: 23-Aug-2004

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media