# An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size

### Chiara Valentina Schiavo, Andrea Visconti

#### Abstract

To overcome the piracy problem in digital content distribution systems, a number of traitor tracing schemes have been suggested by researchers. The goal of these schemes is to enable the tracer to identify at least one of the traitors. In this context, Matsushita and Imai (2004) proposed a black-box tracing scheme with sublinear header size that is able to perform tracing of self-defensive pirate decoders. Kiayias and Pehlivanoglu (2009) proved that this scheme is vulnerable to an attack which allows an illicit decoder to recognize normal ciphertext to tracing ones and distinguish two consecutive tracing ciphertexts. For making the scheme no more susceptible to such attack, authors modified the encryption phase and assumed that traitors belong to the same user group. In this paper, we present a solution that has no traitors restrictions, repairing the scheme totally. In particular, we modified the tracing scheme proving that (a) a pirate decoder is not able to recognize normal ciphertext to tracing ones with sufficiently high probability, and (b) the statistical distance between two consecutive tracing operations is negligible under Decision Diffie Hellman assumption.

#### References

- Boneh, D. (1998). The Decision Diffie-Hellman Problem. In ANTS, volume 1423 of LNCS, pages 48-63.
- Boneh, D. and Franklin, M. K. (1999). An efficient public key traitor tracing scheme. In CRYPTO, volume 1666 of LNCS, pages 338-353.
- Chor, B., Fiat, A., and Naor, M. (1994). Tracing traitors. In CRYPTO, volume 839 of LNCS, pages 257-270.
- Chor, B., Fiat, A., Naor, M., and Pinkas, B. (2000). Tracing traitors. In IEEE Transactions on Information Theory, volume 46, pages 893-910.
- Dodis, Y. and Fazio, N. (2002). Public key broadcast encryption for stateless receivers. In DRM Workshop, volume 2696 of LNCS, pages 61-80.
- Dwork, C., Lotspiech, J. B., and Naor, M. (1996). Digital signets: Self-enforcing protection of digital information. In STOC, pages 489-498.
- Kiayias, A. and Pehlivanoglu, S. (2009). On the security of a public-key traitor tracing scheme with sublinear ciphertext size. In DRM Workshop, pages 1-10. ACM.
- Kiayias, A. and Pehlivanoglu, S. (2011). Attacking traitor tracing schemes using history recording and abrupt decoders. In ISC, volume 7001 of LNCS, pages 17-31.
- Kiayias, A. and Yung, M. (2001). On crafty pirates and foxy tracers. In DRM Workshop, volume 2320 of LCNS.
- Kurosawa, K. and Desmedt, Y. (1998). Optimum traitor tracing and asymmetric schemes. In EUROCRYPT, pages 145-157.
- Kurosawa, K. and Yoshida, T. (2002). Linear code implies public-key traitor tracing. In Public Key Cryptography, volume 2274 of LNCS, pages 172-187.
- Matsushita, T. (2002). A flexibly revocable key-distribution scheme for efficient black-box tracing. In ICICS, volume 2513 of LNCS, pages 197-208.
- Matsushita, T. and Imai, H. (2004). A public-key black-box traitor tracing scheme with sublinear ciphertext size against self-defensive pirates. In ASIACRYPT, volume 3329 of LNCS, pages 260-275.
- Matsushita, T. and Imai, H. (2006). Hierarchical key assignment for black-box tracing with efficient ciphertext size. In ICICS, volume 4307 of LNCS, pages 92- 111.
- Naor, M. and Pinkas, B. (1998). Threshold traitor tracing. In CRYPTO, volume 1462 of LNCS, pages 502-517.
- Naor, M. and Pinkas, B. (2010). Efficient trace and revoke schemes. Int. J. Inf. Sec., 9(6):411-424.

#### Paper Citation

#### in Harvard Style

Valentina Schiavo C. and Visconti A. (2012). **An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size** . In *Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)* ISBN 978-989-8565-24-2, pages 302-307. DOI: 10.5220/0004074003020307

#### in Bibtex Style

@conference{secrypt12,

author={Chiara Valentina Schiavo and Andrea Visconti},

title={An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size},

booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},

year={2012},

pages={302-307},

publisher={SciTePress},

organization={INSTICC},

doi={10.5220/0004074003020307},

isbn={978-989-8565-24-2},

}

#### in EndNote Style

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)

TI - An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size

SN - 978-989-8565-24-2

AU - Valentina Schiavo C.

AU - Visconti A.

PY - 2012

SP - 302

EP - 307

DO - 10.5220/0004074003020307