200 likes | 470 Views
Broadcast Encryption and Traitor Tracing. 2001. 12. 2001507 Jin Kim. Contents. Introduction Broadcast Encryption Traitor Tracing Traitor Tracing Models Conclusion & Further Work Reference. Broadcast Encryption. Provider transmits encrypted content to a privileged subset of users
E N D
Broadcast Encryption andTraitor Tracing 2001. 12. 2001507 Jin Kim
Contents • Introduction • Broadcast Encryption • Traitor Tracing • Traitor Tracing Models • Conclusion & Further Work • Reference
Broadcast Encryption • Provider transmits encrypted content to a privileged subset of users • Pay TV, Online DB. • Consider a center and a set of users . • The center wishes to broadcast a message to a privileged set of users. • Goal: • Efficiency of • transmission length • storage at the user’s end • the computation in retrieving the common key.
Broadcast Encryption Center E(content) U1 U2 3U Un I1 I2 I3 In Ui Decrypts E(content) using Ii
The Danger • Some Users leak their keys to pirates • Pirates construct unauthorized decryption devices and sell them at a discount K1 K3 K8 E(Content) Content Pirate Box
Stopping Leakage Two non-exclusive approaches: • Traitor Tracing • Trace and Revoke • Trace users who leak their keys • Revoke those keys - rendering pirated boxes dysfunctional. • Powerful combination! • Self Enforcement Goal: discourage users from leaking keys • Idea: key should contain sensitive information that user doesn’t want to spread. • Should be impossible to use without revealing explicitly • Example: Credit Card Number • Challenge: how to embed the sensitive information in the keys
Revocation Legal Decoder M E’(M) Pirate Decoder M’ (decode incorrectly)
Traitors • Traitorsare legitimate users who aid a pirate by: • Plaintext re-transmission • compromised keys
TraitorTracing Goal of Traitor Tracing Schemes: • Find source of keys of illegal decryption devices • If at most ttraitors - should identify (one of) them • No honest user should be implicated K1 K3 K8 Tracer Pirate Box K3
Traitor Tracing • Fighting Piracy • Identify piracy • Prevent transmitting information to pirate users • Identify the source of such piracy • Finding Traitors • Consideration • Memory and Computation requirements • Per authorized user • For the data supplier • Data redundancy overhead
Tracing Schemes • Some Models of previous schemes: • Static • Asymmetric • Dynamic • Sequential • Alternative • If group members can share exactly the same data, the problem of determining guilt or innocent is unsolvable • To find a traitor, Give a slightly different secret to the shares
Chor-Fiat-Naor Scheme • Traitor tracing message : (enabling block, cipher block) • Cipher block : symmetric encryption of the actual data • Enabling block : user’s key set and enabling block can generate decryption key Enabling block Cipher block Personal key broadcast User 1 decrypt Original block decrypt Personal key User n decrypt
Some Schemes • Boneh and Franklin • Fixed key-length of private key • Length of enabling block depends on the # of revocation capability • W. Tzeng and Z. Tzeng • Enlarged the # of revocation capability to the degree of Shamir polynomail • Kim, Lee, and Lim • Enlarged the # of revocation capability to the infinity
Proposed Schems • Based on Lee, Kim and Lim’s Scheme • Difference : • Enabling Block : by reducing random number r • change from <shdxM, A1trxM, A2trxM, t-rxMd, tr, d> to <shdxM, A1txM, A2 txM, t-xMd, d>
Advances in the proposed scheme • Proposed scheme is more useful. • Because of Provider can more short enabling block. • Efficiency of storage at the user’s end • With no change of semantic security
Conclusion • Introducing broadcast encryption and their issue – traitor tracing. • Dividing enabling block & retrieving block is more efficient than all in one scheme. • Proposed method is decreasing the number of each user’s enabling block. • Further Works • Research about • Efficiency of proposed scheme • New (Updated) Traitor Tracing Schemes • Key Management • New (Updated) Broadcast Encryption Scheme • And Provably Secure Broadcast Encryption Scheme • Study on other problems of Broadcast Scheme
References • S. Berkovits. How to Broadcast a Secret. Advances in Cryptology - Eurocrypt ’91, Lecture Notes in Computer Science 547 (1992), pp. 536-541. • A. Fiat and M. Naor. Broadcast Encryption. Advances in Cryptology - Crypto ’93, Lecture Notes in Computer Science 773, (1994), pp. 480–491. • M. Just, E. Kranakis, D. Krizanc ans P. van Oorschot. On Key Distribution via True Broadcasting. In Proceedings of 2nd ACM Conference on Computer and Communications Security, November 1994, pp. 81–88. • B. Chor, A. Fiat and M.Naor. Tracing traitors. Advances in Cryptology - Crypto ’94, Lecture Notes in Computer Science 839, (1994), pp. 257–270. • D. Boneh and M Franklin. An Efficient Public Key Traitor Tracing Scheme. Advances in Cryptology - Crypto ’99, Lecture Notes in Computer Science , (1994), pp. 338–353. • D.H. Lee, H.J. Kim and J.I. Lim. Efficient Public-Key Traitor Tracing in Provably Secure Broadcast Encryption with Unlimited Revocation Capability, WISC 2001, WISC 2001 Proceeding, (2001), pp. 31–42