Identity-Based Trace and Revoke Schemes

被引:0
|
作者
Duong Hieu Phan [1 ]
Viet Cuong Trinh [1 ]
机构
[1] Univ Paris 13, Univ Paris 08, CNRS, LAGA,UMR 7539, Paris, France
来源
PROVABLE SECURITY | 2011年 / 6980卷
关键词
Traitor Tracing; Broadcast Encryption; Subset-cover Framework; Pirate Evolution Attacks; Pirates; 2.0; BROADCAST ENCRYPTION SCHEME; CONSTANT-SIZE CIPHERTEXTS; PIRATE EVOLUTION; SECURE; STORAGE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Trace and revoke systems allow for the secure distribution of digital content in such a way that malicious users, who collude to produce pirate decoders, can be traced back and revoked from the system. In this paper, we consider such schemes in the identity-based setting, by extending the model of identity-based traitor tracing scheme by Abdalla et al. to support revocation. The proposed constructions rely on the subset cover framework. We first propose a generic construction which transforms an identity-based encryption with wildcard (WIBE) of depth log(N) (N being the number of users) into an identity-based trace and revoke scheme by relying on the complete subtree framework (of depth log(N)). This leads, however, to a scheme with log(N) private key size (as in a complete subtree scheme). We improve this scheme by introducing generalized WIBE (GWIBE) and propose a second construction based on GWIBE of two levels. The latter scheme provides the nice feature of having constant private key size (3 group elements). In our schemes, we also deal with advanced attacks in the subset cover framework, namely pirate evolution attacks (PEvoA) and pirates 2.0. The only known strategy to protect schemes in the subset cover framework against pirate evolution attacks was proposed by Jin and Lotspiech but decreases seriously the efficiency of the original schemes: each subset is expanded to many others subsets; the total number of subsets to be used in the encryption could thus be O(N-1/b) to prevent a traitor from creating more than b generations. Our GWIBE based scheme, resisting PEvoA better than the Jin and Lotspiech's method. Moreover, our method does not need to change the partitioning procedure in the original complete subtree scheme and therefore, the resulted schemes are very competitive compared to the original scheme, with r log(N/r) log N-size ciphertext and constant size private key.
引用
收藏
页码:204 / 221
页数:18
相关论文
共 50 条
  • [1] Efficient trace and revoke schemes
    Moni Naor
    Benny Pinkas
    [J]. International Journal of Information Security, 2010, 9 : 411 - 424
  • [2] Efficient trace and revoke schemes
    Naor, M
    Pinkas, B
    [J]. FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2001, 1962 : 1 - 20
  • [3] Efficient trace and revoke schemes
    Naor, Moni
    Pinkas, Benny
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (06) : 411 - 424
  • [4] Hierarchical Identity-Based Identification Schemes
    Chin, Ji-Jian
    Heng, Swee-Huay
    Goi, Bok-Min
    [J]. SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 93 - +
  • [5] Identity-based proxy signcryption schemes
    Jian, Wu
    [J]. INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
  • [6] Efficient identity-based broadcast signcryption schemes
    Kim, Intae
    Hwang, Seong Oun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 914 - 925
  • [7] Cryptanalysis of two identity-based signcryption schemes
    Wang, Huaqun
    Zhang, Yuqing
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 694 - 698
  • [8] Interdomain Identity-Based Key Agreement Schemes
    Fan, Chun-I
    Lin, Yi-Hui
    Hsu, Tuan-Hung
    Hsu, Ruei-Hau
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [9] A computational review of identity-based signcryption schemes
    Mandal, Murari
    Sharma, Gaurav
    Verma, Anil K.
    [J]. International Journal of Network Security, 2016, 18 (05) : 969 - 977
  • [10] Argument on biometrics identity-based encryption schemes
    Tan, Syh-Yuan
    Jin, Zhe
    Teoh, Andrew Beng Jin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (11) : 1344 - 1352