Codes based tracing and revoking scheme with constant ciphertext

  • Authors:
  • Xingwen Zhao;Hui Li

  • Affiliations:
  • State Key Laboratory of ISN, Xidian University, Xi'an, China, School of Telecommunications Engineering, Xidian University, Xi'an, China;State Key Laboratory of ISN, Xidian University, Xi'an, China, School of Telecommunications Engineering, Xidian University, Xi'an, China

  • Venue:
  • ProvSec'12 Proceedings of the 6th international conference on Provable Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Traitor tracing is needed because some users in broadcast encryption system may give out their decryption keys to construct pirate decoders. Many codes based traitor tracing schemes were proposed. However, as stated by Billet and Phan in ICITS 2008, they were lacking in revocation ability. In this paper, we bring forward a codes based tracing and revoking scheme. Revocation ability helps to disable identified traitors and users who fail to fulfill the payments in each broadcast, so that the broadcast encryption system can be more practical. Based on Park et al.'s public key broadcast encryption scheme, we embed collusion secure code into each user's decryption keys so as we can send messages to a set of designated receivers while at the same time we can recover information of codeword from the feedback of the pirate decoder by employing Boneh and Naor's traitor tracing method. Our scheme achieves constant-size ciphertext which makes it suitable for situations where bandwidth is precious. Our scheme is based on collusion secure codes, and it can be extended to adopt other codes such as identifiable parent property (IPP) codes. Our method presents an answer to the problem left open by Billet and Phan.