above shown scenario, one cannot do that. Indeed any
S
′
⊆ S
∗
and |S
′
| > 2 users may have colluded to forge
that private key. The broadcast encryption scheme has
no way to revoke this forged key. It can become a
global secret and the broadcast encryption scheme is
therefore broken. This broadcast encryption scheme
is not sound.
3 TRAITOR TRACING WITHOUT
REVOCATION CAPABILITY?
We want to argue that a traitor tracing scheme with-
out revocation capability is of little value if not use-
less in reality. However, while there exist some trace-
and-revoke systems (Boneh et al., 2006a) for clone
pirate attack, it is considered optional rather than a
must-have. As a result, for some existing schemes, it
is impossible to add revocation capability on top of
tracing.
As an example, the same authors for the above
broadcast encryption scheme came up with a separate
traitor tracing scheme which appeared in Eurocrypt
2006 (Boneh et al., 2006b). Without going to much
detail, we point out that scheme is impossible to re-
voke. In fact, if one needs to revoke a detected hack-
ing device i, one would also have to revoke devices
i+ 1...N. Of course this is unacceptable.
4 TRAITOR TRACING DOES NOT
SUPPORT MULTI-TIME
TRACING?
To be practically useful, a traitor tracing system must
be able to trace again responding to new attack after
the previous traitors are identified and revoked. How-
ever it is not always easy to achieve continued tracing
after revocation. We show this using a traitor tracing
scheme, the JLN scheme (H. Jin and Nusser, 2004),
that was designed to defend against anonymous at-
tack.
Recall that in anonymous attack the attackers re-
distribute the media key or the decrypted content it-
self just to stay anonymous and avoid being identi-
fied. To defend against anonymous attack, different
versions of the content encrypting key as well as the
content are needed. To do that, the content is divided
into multiple segments of which n segments are cho-
sen, each to have q variations. These variations are
not only differently watermarked, but also differently
encrypted. Each device can only decrypt one of the
K1
link
...
link
K2
...
...
Ki
...
K3
hdr
K3
...
link
...
link
K1
...
...
Ki
hdr
Ki
link
...
K5
...
link
K1
...
...
hdr
Kj
...
0
0
K1
...
K6
...
0
unconditional
(1)
conditional
(2)
conditional
(3)
conditional
(4)
Figure 1: Sample SKB.
variations for each segment. In other words, each de-
vice plays back the content through a different path.
This effectively builds different versions of the con-
tent. Each version of the content contains one varia-
tion for each segment. In order to avoid having large
number of variations at any single point and still be
able to support large number of users, the JLN scheme
adopted two levels of codes. The ”inner code” is used
to assign variations within a movie to effectively cre-
ate multiple versions of a movie, and the ”outer code”
is used to assign movie versions over a sequence of
movies.
The traitor tracing keys for the above scheme are
assigned from a large matrix based on the outer code.
The columns correspond to the movies in the se-
quence, the rows correspond to different versions for
each movie. Each device is assigned exactly one key
from each column. The tracing keys are called ”se-
quence keys”.
Similar as Media Key Block (MKB), one can
build a structure called Sequence Key Block (SKB)
to revoke sequence keys. The idea is to revoke the
entire set of sequence keys owned by a traitor. Of
course, many devices might share a single compro-
mised key. The purpose of the Sequence Key Block
is to give all innocent devices a column they can use
to calculate a correct answer, while at the same time
preventing compromised devices (who have compro-
mised keys in all columns) from getting to a correct
answer. Keep in mind in an SKB there are actually
many correct answers, one for each variation in the
content.
Unfortunately, the above combined scheme can-
not support multi-time continued tracing. If the at-
tackers combine the revoked keys with the keys that
have not been detected, there are multiple paths to ob-
tain the same valid answer. In other words, it is not
always possible to know from which column the SKB
processing ends to get a valid key, thus it hurts tracing.
To force the undetected traitors to reveal the keys
they use when processing SKB, one must make sure
A CLOSER LOOK AT BROADCAST ENCRYPTION AND TRAITOR TRACING FOR CONTENT PROTECTION
297