Fully Secure Codes Based Tracing and Revoking Scheme with Constant Ciphertext

Article Preview

Abstract:

In broadcast encryption system certain users may leak their decryption keys to build pirate decoders, so traitor tracing is quite necessary. There exist many codes based traitor tracing schemes. As pointed out by Billet and Phan in ICITS 2008, these schemes lack revocation ability. The ability of revocation can disable identified malicious users and users who fail to fulfill the payments, so that the broadcast encryption system can be more practical. Recently, Zhao and Li presented a construction of codes based tracing and revoking scheme which achieves user revocation as well as traitor tracing. However, their scheme is only secure against chosen plaintext attacks under selective-adversary model with random oracle. In this paper, we obtain a new construction of codes based tracing and revoking scheme which is proved secure against chosen ciphertext attacks under adaptive-adversary model without random oracle. Our idea is to insert codeword into Boneh and Hamburgs identity based broadcast encryption scheme to retain the ability of user revocation and use Boneh and Naors method to trace traitors. Our fully secure scheme is roughly as efficient as Zhao and Lis scheme while the security is enhanced.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3300-3307

Citation:

Online since:

March 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] B. Chor, A. Fiat, and M. Naor, in: Advances in Cryptology - CRYPTO '93 (Santa Barbara, California, USA, August 22-26, 1993), LNCS Vol. 839, Springer (1994), p.257.

DOI: 10.1007/3-540-48658-5_25

Google Scholar

[2] A. Kiayias and M. Yung, in: Advances in Cryptology - EUROCRYPT 2002 (Amsterdam, The Netherlands, April 28 - May 2, 2002), LNCS Vol. 2332, Springer (2002), p.450.

Google Scholar

[3] H. Chabanne, D. H. Phan, and D. Pointcheval, in: Advances in Cryptology - EUROCRYPT 2005(Aarhus, Denmark, May 22-26, 2005), LNCS Vol. 3494, Springer (2005), p.542.

DOI: 10.1007/11426639_32

Google Scholar

[4] M. Abdalla, A. W. Dent, J. Malone-Lee, G. Neven, D. Phan, and N. P. Smart, in: Public Key Cryptography - PKC 2007 (Beijing, China, April 16-20, 2007), LNCS Vol. 4450, Springer (2007), p.361.

DOI: 10.1007/978-3-540-71677-8_24

Google Scholar

[5] D. Boneh and M. Naor, in: Proceedings of the 2008 ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, October 27-31, 2008), ACM (2008), p.501.

Google Scholar

[6] O. Billet and D. H. Phan, in: Information Theoretic Security (Calgary, Canada, August 10-13, 2008), LNCS Vol. 5155, Springer (2008), p.171.

DOI: 10.1007/978-3-540-85093-9_17

Google Scholar

[7] Y. -R. Chen and W. -G. Tzeng, in: Information and Communications Security (Beijing, China, December 14-17, 2009), LNCS Vol. 5927, Springer (2009), p.121.

Google Scholar

[8] X. Zhao and F. Zhang, in: Information Security Practice and Experience (Guangzhou, China, May 30 - June 1, 2011), LNCS Vol. 6672, Springer (2011), p.302.

Google Scholar

[9] X. Zhao and H. Li, in: Provable Security (Chengdu, China, September 26-28, 2012), LNCS Vol. 7496, Springer (2012), p.318.

Google Scholar

[10] J. H. Park, H. J. Kim, M. H. Sung, and D. H. Lee, Broadcasting, IEEE Transactions on, Vol. 54, no. 3, IEEE (2008), p.401.

Google Scholar

[11] O. Billet and D. H. Phan, in: Advances in Cryptology - EUROCRYPT 2009 (Cologne, Germany, April 26-30, 2009), LNCS Vol. 5479, Springer (2009), p.189.

Google Scholar

[12] D. Boneh and M. Hamburg, in: Advances in Cryptology - ASIACRYPT 2008 (Melbourne, Australia, December 7-11, 2008), LNCS Vol. 5350, Springer (2008), p.455.

Google Scholar

[13] C. Gentry, in: Advances in Cryptology - EUROCRYPT 2006 (St. Petersburg, Russia, May 28 - June 1, 2006), LNCS Vol. 4004, Springer (2006), p.445.

Google Scholar

[14] D. Boneh and M. Franklin, in: Advances in Cryptology - CRYPTO 2001 (Santa Barbara, California, USA, August 19-23, 2001), LNCS Vol. 2139, Springer. (2001), p.213.

DOI: 10.1007/3-540-44647-8

Google Scholar

[15] D. Boneh, X. Boyen, and E. -J. Goh, in: Advances in Cryptology - EUROCRYPT 2005 (Aarhus, Denmark, May 22-26, 2005), LNCS Vol. 3494, Springer (2005), p.440.

DOI: 10.1007/11426639_26

Google Scholar

[16] X. Zhao, G. Zhao and H. Li, Information on http: /web. xidian. edu. cn/xwzhao/en/papers. html.

Google Scholar

[17] N. Attrapadung, B. Libert, and E. de Panafieu, in: Public Key Cryptography - PKC 2011 (Taormina, Italy, March 6-9, 2011), LNCS Vol. 6571, Springer (2011), p.90.

Google Scholar

[18] R. Canetti, S. Halevi, and J. Katz, in: Advances in Cryptology - EUROCRYPT 2004 (Interlaken, Switzerland, May 2-6, 2004), LNCS Vol. 3027, Springer (2004), p.207.

DOI: 10.1007/978-3-540-24676-3_13

Google Scholar

[19] D. Boneh and J. Katz, in: Topics in Cryptology - CT-RSA 2005 (San Francisco, CA, USA, February 14-18, 2005), LNCS Vol. 3376, Springer (2005), p.87.

DOI: 10.1007/b105222

Google Scholar