Some Advances in Broadcast Encryption and Traitor Tracing Duong - - PowerPoint PPT Presentation

some advances in broadcast encryption and traitor tracing
SMART_READER_LITE
LIVE PREVIEW

Some Advances in Broadcast Encryption and Traitor Tracing Duong - - PowerPoint PPT Presentation

Some Advances in Broadcast Encryption and Traitor Tracing Duong Hieu Phan ( S eminaire LIPN - 18 Novembre 2014 ) Duong Hieu Phan Some Advances in BE&TT S eminaire LIPN 1 / 42 Multi-receiver Encryption From One-to-one to


slide-1
SLIDE 1

Some Advances in Broadcast Encryption and Traitor Tracing

Duong Hieu Phan (S´

eminaire LIPN - 18 Novembre 2014 )

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 1 / 42

slide-2
SLIDE 2

Multi-receiver Encryption

From “One-to-one” to ‘one-to-many” communications

Provide all users with the same key → problems:

1

Impossibility to know the source of the key leakage (traitor)

2

Impossibility to revoke a user, except by resetting the parameters

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 2 / 42

slide-3
SLIDE 3

Broadcast Encryption [B91,FN94] & Traitor Tracing [CFN94]

12 32:47 BO: 12 32:47 BO: 12 32:47 BO: 12 32:47 BO: 12 32:47 BO:

Desired Properties

1

Tracing traitors from a pirate decoder

◮ White-box tracing ◮ Black-box confirmation, black-box tracing 2

Revoking non-legitimate users

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 3 / 42

slide-4
SLIDE 4

Broadcasting & Tracing

Composed by G.Allegri (around 1630) for use in the Sistine Chapel on Wednesday and Friday Kept secret by the Vatican

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 4 / 42

slide-5
SLIDE 5

Broadcasting & Tracing

The piece was revealed in 1771 → Mozart

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 5 / 42

slide-6
SLIDE 6

Broadcasting & Tracing

The piece was revealed in 1771 → Mozart Only Mozart can do it! Same idea in traitor tracing: identify who is capable of producing the pirate decoder

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 5 / 42

slide-7
SLIDE 7

Outline

1

Randomized Exclusive Set System

2

Lattice-based Encryption

3

Extended Models

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 6 / 42

slide-8
SLIDE 8

Outline

1

Randomized Exclusive Set System

2

Lattice-based Encryption

3

Extended Models

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 7 / 42

slide-9
SLIDE 9

Exclusive Set System (ESS)

[ALO98]

F is an (N, ℓ, r, s)-ESS if: F: a family of ℓ subsets of [N] For any R ⊆ [N] of size at most r, there exists S1, . . . Ss ∈ F s.t. [N] − R =

s

  • i=1

Si

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 8 / 42

slide-10
SLIDE 10

Exclusive Set System (ESS)

[ALO98]

F is an (N, ℓ, r, s)-ESS if: F: a family of ℓ subsets of [N] For any R ⊆ [N] of size at most r, there exists S1, . . . Ss ∈ F s.t. [N] − R =

s

  • i=1

Si

From ESS to Revoke System

Each Si ∈ F is associated to a key Ki User u receives all keys Ki that u ∈ Si To revoke a set R ⊆ [N] of size at most r:

◮ Find S1, . . . Ss ∈ F s.t. [N] − R = s

i=1 Si

◮ Encrypt the message with each key Ki Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 8 / 42

slide-11
SLIDE 11

NNL Schemes viewed as Exclusive Set Systems

[NNL01]

S1 S S S S S S S S S S S S S S u u u u u u u u

2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 2 3 4 5 6 7 8

F = {S1, S2, . . . , S15} Si contains all users (i.e. leaves) in the subtree of node i (e.g. S2 = {u1, u2, u3, u4}) Revoked set R = {u4, u5, u6} Encrypt with keys at S4, S7, S10 Complete-subtree is a (N, 2N − 1, r, r log(N/r))-ESS

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 9 / 42

slide-12
SLIDE 12

Exclusive Set System under Code’s View

S1 S S S S S S S S S S S S S S u u u u u u u u

2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 2 3 4 5 6 7 8

u1 u2 u3 u4 u5 u6 u7 u8 S1 1 1 1 1 1 1 1 1 S2 1 1 1 1 S3 1 1 1 1 S4 1 1 S5 1 1 S6 1 1 S7 1 1 S8 1 1 S9 1 S10 1 S11 1 S12 1 S13 1 S14 1 S15 1

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 10 / 42

slide-13
SLIDE 13

NNL Schemes

S1 S S S S S S S S S S S S S S u u u u u u u u

2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 2 3 4 5 6 7 8

u1 u2 u3 u4 u5 u6 u7 u8 S1 1 1 1 1 1 1 1 1 S2 1 1 1 1 S3 1 1 1 1 S4 1 1 S5 1 1 S6 1 1 S7 1 1 S8 1 1 S9 1 S10 1 S11 1 S12 1 S13 1 S14 1 S15 1

Tracing Levels for NNL schemes

Relaxed level of black-box tracing Black-box tracing for “naive” decoders

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 11 / 42

slide-14
SLIDE 14

NNL Schemes

S1 S S S S S S S S S S S S S S u u u u u u u u

2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 2 3 4 5 6 7 8

u1 u2 u3 u4 u5 u6 u7 u8 S1 1 1 1 1 1 1 1 1 S2 1 1 1 1 S3 1 1 1 1 S4 1 1 S5 1 1 S6 1 1 S7 1 1 S8 1 1 S9 1 S10 1 S11 1 S12 1 S13 1 S14 1 S15 1

Weakness in Black-box Tracing

Highly structured matrix Pirate could thus detect “dangerous” queries and refuse to decrypt

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 11 / 42

slide-15
SLIDE 15

NNL Schemes

S1 S S S S S S S S S S S S S S u u u u u u u u

2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 2 3 4 5 6 7 8

u1 u2 u3 u4 u5 u6 u7 u8 S1 1 1 1 1 1 1 1 1 S2 1 1 1 1 S3 1 1 1 1 S4 1 1 S5 1 1 S6 1 1 S7 1 1 S8 1 1 S9 1 S10 1 S11 1 S12 1 S13 1 S14 1 S15 1

In General, Previous Results for ESS

Black-box tracing for “naive” decoders (decrypt all ciphertexts without any strategy) c-traceability: a white-box tracing for “imperfect” decoders

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 11 / 42

slide-16
SLIDE 16

NNL Schemes

S1 S S S S S S S S S S S S S S u u u u u u u u

2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 2 3 4 5 6 7 8

u1 u2 u3 u4 u5 u6 u7 u8 S1 1 1 1 1 1 1 1 1 S2 1 1 1 1 S3 1 1 1 1 S4 1 1 S5 1 1 S6 1 1 S7 1 1 S8 1 1 S9 1 S10 1 S11 1 S12 1 S13 1 S14 1 S15 1

Our Objectives

Black-box tracing in ESS for “smart” decoders (efficiency comparable to NNL schemes)

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 11 / 42

slide-17
SLIDE 17

Randomized ESS

Recall

1 row → 1 subset → 1 key 1 column → 1 user → user j has key Ki iff Mij = 1

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 12 / 42

slide-18
SLIDE 18

Randomized ESS

Recall

1 row → 1 subset → 1 key 1 column → 1 user → user j has key Ki iff Mij = 1

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 12 / 42

slide-19
SLIDE 19

Randomized ESS

Property

Set n = r log2(N2e/r), b = 4r With overwhelming probability → (N, 8r 2 log N, r, 8r log N)-ESS. (complete-subtree is (N, 2N − 1, r, r(log(N/r))-ESS)

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 12 / 42

slide-20
SLIDE 20

Tracing for ESS

White-box

Tracer can open the box → get the pirate word w which is the union of traitors’ codewords

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 13 / 42

slide-21
SLIDE 21

White-box Tracing for ESS

White-box Tracing

(r, s, N, l)-ESS is also a r-disjunct matrix, i.e., no column is contained in the union of any r other columns r-disjunct matrix: from the union of at most r columns, one can find back the r columns (the Group Testing technique) ↔ Given the pirate word w, trace back the traitors

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 14 / 42

slide-22
SLIDE 22

White-box Tracing for ESS

White-box Tracing

(r, s, N, l)-ESS is also a r-disjunct matrix, i.e., no column is contained in the union of any r other columns r-disjunct matrix: from the union of at most r columns, one can find back the r columns (the Group Testing technique) ↔ Given the pirate word w, trace back the traitors

Challenge for Black-box Tracing

How to find the pirate word w?

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 14 / 42

slide-23
SLIDE 23

Black-box Tracing for ESS

Shadow Group Testing Technique[NPP , Algorithmica13]

Black-box access to pirate decoder

Asking random queries of the same form as broadcasted ciphertexts

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 15 / 42

slide-24
SLIDE 24

Black-box Tracing for ESS

Shadow Group Testing Technique[NPP , Algorithmica13]

Black-box Access to Pirate Decoder

Asking random queries of the same form as broadcasted ciphertexts

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 15 / 42

slide-25
SLIDE 25

Black-box Tracing for ESS

Shadow Group Testing Technique[NPP , Algorithmica13]

Test the decryptability of the piarte decoder on the queries → Get “Feedback” vector = union of the columns at position 1 in the pirate word w

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 15 / 42

slide-26
SLIDE 26

Black-box Tracing for ESS

Shadow Group Testing Technique[NPP , Algorithmica13]

We show that the matrix of queries is also an ESS → From “Feedback” vector, get the pirate word w Large number of queries → the tracing is efficient when the number of traitors is O(log N)

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 15 / 42

slide-27
SLIDE 27

Black-box Tracing for ESS

Shadow Group Testing Technique[NPP , Algorithmica13]

In brief: We get (N, 8r 2 log N, r, 8r log N)-ESS Ciphertext: constant factor w.r.t the complete-subtree and a log N factor w.r.t the subset-difference scheme The first black-box tracing ESS against non-naive pirates

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 15 / 42

slide-28
SLIDE 28

Combinatorial Approach: Other Contributions

r2 ru r1 ri Tr2 Tru · · · Tr1 · · · Tri T1 · · · · · · TL SK T z2 zu z1 zi · · · · · ·

1 1

z2 zu z1 zi · · · · · ·

1 1 1 1

D

a

D D D k2 ku k1 ki ˜ ˜ ˜ ˜

Constant-size Ciphertext [BP08]: Based on Robust Collusion Secure Code [S06,N09] Drawback: large secret key size (O(t2 log2(N/ǫ)))

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 16 / 42

slide-29
SLIDE 29

Combinatorial Approach: Other Contributions

π

* 0 * 1 * * * * * * * * 1 * * 0 * 1 * * * * * m m m m m m m

4 5 6 7 3 2 1 Hiding a mark at position 5 in a sequence of 7 blocks.

Message Tracing with Optimal Transmission Rate [PPS12] The rate between ciphertext and plaintext is ≈ 1 (constant size is achieved in [KY01)] It requires us to construct an efficient construction of 2-user Anonymous BE Large size plaintext → suitable for broadcasting messages

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 17 / 42

slide-30
SLIDE 30

Outline

1

Randomized Exclusive Set System

2

Lattice-based Encryption

3

Extended Models

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 18 / 42

slide-31
SLIDE 31

From Encryption to Multi-receiver Encryption

ElGamal Encryption Scheme

G =< g > of order q Secret key: α ← Zq Public key: y = gα Ciphertext: (gr, yrm), where r ← Zq Decryption: from α, compute yr = (gr)α and recover m

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 19 / 42

slide-32
SLIDE 32

From Encryption to Multi-receiver Encryption

ElGamal Encryption Scheme

G =< g > of order q Secret key: α ← Zq Public key: y = gα Ciphertext: (gr, yrm), where r ← Zq Decryption: from α, compute yr = (gr)α and recover m

Boneh-Franklin Multi-receiver Encryption

Main problem: How to extend the same y to support many users?

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 19 / 42

slide-33
SLIDE 33

From Encryption to Multi-receiver Encryption

ElGamal Encryption Scheme

G =< g > of order q Secret key: α ← Zq Public key: y = gα Ciphertext: (gr, yrm), where r ← Zq Decryption: from α, compute yr = (gr)α and recover m

Boneh-Franklin Multi-receiver Encryption

Main problem: How to extend the same y to support many users? Each user receive a representation (α1, . . . , αk) of y in a public basis (h1, . . . , hk): (y = hα1

1 . . . hαk k )

Each user can compute yr from (hr

1, . . . , hr k)

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 19 / 42

slide-34
SLIDE 34

From Encryption to Multi-receiver Encryption

ElGamal Encryption Scheme

G =< g > of order q Secret key: α ← Zq Public key: y = gα Ciphertext: (gr, yrm), where r ← Zq Decryption: from α, compute yr = (gr)α and recover m

Boneh-Franklin Multi-receiver Encryption

Main problem: How to extend the same y to support many users? Each user receive a representation (α1, . . . , αk) of y in a public basis (h1, . . . , hk): (y = hα1

1 . . . hαk k )

Each user can compute yr from (hr

1, . . . , hr k)

Public key: (y, h1, . . . , hk) Ciphertext: (hr

1, . . . , hr k, yrm)

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 19 / 42

slide-35
SLIDE 35

Boneh-Franklin Scheme

Boneh-Franklin Traitor Tracing

Transformation from Elgamal Encryption to Traitor Tracing: linear loss in the number of traitors Achieve white-box tracing and Black-box confirmation

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 20 / 42

slide-36
SLIDE 36

Boneh-Franklin Scheme

Boneh-Franklin Traitor Tracing

Transformation from Elgamal Encryption to Traitor Tracing: linear loss in the number of traitors Achieve white-box tracing and Black-box confirmation

Our Work

Study the problem in lattice-based setting Get a more efficient transformation: LWE-based Encryption ≈ LWE traitor tracing Achieve Black-box confirmation as in Boneh-Franklin scheme

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 20 / 42

slide-37
SLIDE 37

The SIS and LWE problems

Params: m, n, q ≥ 0, A ← ֓ U(Zm×n

q

) SIS Find small x ∈ Zm \ 0 s.t. xtA = 0 [q]

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 21 / 42

slide-38
SLIDE 38

The SIS and LWE problems

Params: m, n, q ≥ 0, A ← ֓ U(Zm×n

q

) SIS Find small x ∈ Zm \ 0 s.t. xtA = 0 [q] LWE

  • Dist. As + e and U(Zm

q ),

for s ← ֓ U(Zn

q), noise e ∈

Zm

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 21 / 42

slide-39
SLIDE 39

The SIS and LWE problems

Params: m, n, q ≥ 0, A ← ֓ U(Zm×n

q

) SIS Find small x ∈ Zm \ 0 s.t. xtA = 0 [q] LWE

  • Dist. As + e and U(Zm

q ),

for s ← ֓ U(Zn

q), noise e ∈

Zm

Applications

Hash function [Ajt’96], signature [GPV’08], encryption [Reg’05], ...

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 21 / 42

slide-40
SLIDE 40

SIS → k-SIS and LWE → k-LWE

Params: m, n, q ≥ 0, A ← ֓ U(Zm×n

q

) k small hints (xi)i≤k s.t. xt

i A = 0 [q]

k-SIS [BoFr’11] Find small x ∈ Zm s.t. xtA = 0 [q] x / ∈ Span(xi)

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 22 / 42

slide-41
SLIDE 41

SIS → k-SIS and LWE → k-LWE

Params: m, n, q ≥ 0, A ← ֓ U(Zm×n

q

) k small hints (xi)i≤k s.t. xt

i A = 0 [q]

k-SIS [BoFr’11] Find small x ∈ Zm s.t. xtA = 0 [q] x / ∈ Span(xi) k-LWE Distinguish As + e and U(Span(xi)⊥) + e′ for s ← ֓ U(Zn

q) and small

noises e, e′ ∈ Zm

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 22 / 42

slide-42
SLIDE 42

SIS → k-SIS and LWE → k-LWE

Params: m, n, q ≥ 0, A ← ֓ U(Zm×n

q

) k small hints (xi)i≤k s.t. xt

i A = 0 [q]

k-SIS [BoFr’11] Find small x ∈ Zm s.t. xtA = 0 [q] x / ∈ Span(xi) k-LWE Distinguish As + e and U(Span(xi)⊥) + e′ for s ← ֓ U(Zn

q) and small

noises e, e′ ∈ Zm Original application of k-SIS: Homomorphic signatures [BoFr’11]

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 22 / 42

slide-43
SLIDE 43

Contributions [LPSS, Crypto14]

New Variant of LWE

Introduction of k-LWE A reduction from LWE to k-LWE (and from SIS to k-SIS) with polynomial loss in k (Boneh-Freeman11 from SIS to k-SIS: exponential loss in k. They left the open question to improve the reduction)

Application

Application to traitor tracing encryption, ` a la Boneh-Franklin A modification that enjoys public traceability

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 23 / 42

slide-44
SLIDE 44

A Multi-receiver Dual-Regev Encryption (based on [GPV’08])

Dual-Regev Encryption

Public key: A ∈ Zm×n

q

and u ∈ Zn

q

Secret key: x gaussian s.t. xtA = ut [q] Ciphertext: (c1, c2) Decryption: c2 − xtc1

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 24 / 42

slide-45
SLIDE 45

A Multi-receiver Dual-Regev Encryption (based on [GPV’08])

Multi-receiver Encryption

Public key: A ∈ Zm×n

q

and u ∈ Zn

q

Secret keys: xi gaussian s.t. xt

i A = ut [q]

Ciphertext: (c1, c2) Decryption: c2 − xtc1 Using trapdoor T (full rank small T ∈ Zm×m s.t. T · A = 0 [q]),

  • ne can sample many secret

keys xi [GPV08]

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 24 / 42

slide-46
SLIDE 46

k-LWE-based Traitor Tracing, ` a la Boneh-Frranklin

Pirate

Up to k users may collude ⇒ A coalition is given up to k LWE hints to create a pirate decryption box

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 25 / 42

slide-47
SLIDE 47

k-LWE-based Traitor Tracing, ` a la Boneh-Frranklin

Pirate

Up to k users may collude ⇒ A coalition is given up to k LWE hints to create a pirate decryption box

Tracer

Assume we suspect the coalition to be among users 1 to k. Test the behaviour of the box on the fake ciphertexts: U

  • (Spani≤k(xt

i |1))⊥

. The coalition owns only those xj’s → the fake and normal ciphertexts are indistinguishable, under k-LWE

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 25 / 42

slide-48
SLIDE 48

How to Prove The Hardness of k-SIS and k-LWE

Reducing LWE to k-LWE

Input: a SIS / LWE instance corresponding to A From A, construct A∗ along with k hints for A∗ Give A∗ and the k hints to a k-SIS / k-LWE solver Based on a k-SIS or k-LWE solution for A∗, derive a SIS / LWE solution for A

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 26 / 42

slide-49
SLIDE 49

Hardness of k-LWE: The [BF11] Approach

Main Idea

1

Sample k hints x1, . . . , xk that form a k × (m + k) matrix X ∗ = (H|G) (using the xi’s as rows)

2

Append to A an extra k × n matrix A′ = −G−1H · A [q]

3

Append to b = As + e an extra b′ = −G−1H · b [q]

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 27 / 42

slide-50
SLIDE 50

Hardness of k-LWE: The [BF11] Approach

Obstacle

We have b′ = A′s + e′ with e′ = −G−1H · e [q] e′ is not small! To fix it, multiply everything by det(G) Blow-up: e′ ≈ k!e, which is ≪ q for tiny k

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 27 / 42

slide-51
SLIDE 51

Our Reduction: Polynomial Loss in k

Main Steps

1

Generate a small transformation matrix T such that it is easy to generate gaussian X ∗ (k hints matrix) : X ∗ × T = 0

2

T(As + e) = (TA)s + (Te) = A∗ + e∗

3

Avoid “exponential noise blowup”, Te is of polynomial size in e

◮ Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 28 / 42

slide-52
SLIDE 52

Transformation Matrix T and Hints X ∗

1

Main tool: A small U such that the first k rows of U−1 are small Gaussian (relying on LHL)

2

Sampling a Gaussian matrix V

3

Define X ∗ as the first k rows of V || U−1

4

LWE(A, As + e) → k − LWE(TA, T(As + e) + e′)

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 29 / 42

slide-53
SLIDE 53

Public Traceability

Public Traceability [CPP05]

Classical tracing: relies on the secret information. ⇒ Complete trust in the tracing authority, huge tracing cost. Public tracing: anyone can trace using the public key ⇒ Delegation of the tracing procedure

Schemes with Public Traceability

IPP code-based scheme [PST06] Pairings based scheme [BW06]: full collusion but with large ciphertext size O( √ N)

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 30 / 42

slide-54
SLIDE 54

Public Traceability

Public Sampling

1

Each xi is associated to a public matrix Gi

2

Hard to distinguish U(Span(x+

i )⊥) + noise and Im(Gk) + noise

3

Publicly sample a signal in U(Span(x+

i )⊥) + noise from Gi

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 30 / 42

slide-55
SLIDE 55

Public Traceability

Public Tracing

1

Public matrix Gi

2

It is hard to distinguish U(Spanj

i=1(xi)⊥) + noise and

Im(G1) ∩ . . . ∩ Im(Gj) + noise, for any 1 ≤ j ≤ k

3

We can thus sample tracing signals from G1, . . . , Gk

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 30 / 42

slide-56
SLIDE 56

Algebraic Approach: Other Contributions

Pairings based Constructions

BGW scheme: efficient pairing based broadcast encryption ⇒ Extension: inclusive-exclusive mode and adaptive security [PPSS12] Combination of algebraic and combinatorial methods that relies

  • n parings and collusion secure codes.

◮ Identity-based Traitor Tracing [ADMNPS07] ◮ Identity-based Trace & Revoke [PT11] Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 31 / 42

slide-57
SLIDE 57

Outline

1

Randomized Exclusive Set System

2

Lattice-based Encryption

3

Extended Models

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 32 / 42

slide-58
SLIDE 58

Classical Collusions

12 32:47 BO: 12 32:47 BO: 12 32:47 BO: 12 32:47 BO: 12 32:47 BO:

Facts

Each user contributes its whole key Traitors should trust each other

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 33 / 42

slide-59
SLIDE 59

Pirates 2.0: Traitors Collaborating in Public

[BP, Eurocrypt09]

12 32:47 BO: 12 32:47 BO: 12 32:47 BO: 12 32:47 BO: 12 32:47 BO:

Principle

Each traitor contributes a partial or derived information “Imperfect” Pirate Decoder but still very efficient (inspired from Pirate Evolution Attack [KP07]) High anonymity of traitors

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 34 / 42

slide-60
SLIDE 60

Practical Impact of Pirates 2.0

Collusion Size

Traitors do not need to trust anyone Guaranteed anonymity is a big incentive to contribute secrets Even partial information extracted from tamper resistant or

  • bfuscated decoders can be useful

Traitors can contribute information adaptatively

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 35 / 42

slide-61
SLIDE 61

Practical Impact of Pirates 2.0

Impact for Subset Difference Scheme

Considering the classical setting which covers 232 users Then, 10000 traitors (1000 in adaptative attacks) can decrypt all ciphertexts with headers of size less than 128 Mb High anonymity level: each traitor is covered by 4 millions users

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 35 / 42

slide-62
SLIDE 62

Extended Models: Other Contributions

Multi-channel Broadcast Encryption [PPT13]

Consider simultanous broadcast encryption New scheme with constant ciphertext size Compress session keys of all channels into one header → high-time complexity to decompress

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 36 / 42

slide-63
SLIDE 63

Extended Models: Other Contributions

Multi-channel Broadcast Encryption [PPT13]

Consider simultanous broadcast encryption New scheme with constant ciphertext size Compress session keys of all channels into one header → high-time complexity to decompress

Decentralized Broadcast Encryption[PPS12]

No need for a trusted authority Users agree on system parameters New tree-based scheme based on Diffie-Hellman perfect entropy extractor

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 36 / 42

slide-64
SLIDE 64

Discussion

Summary

Tools & constructions for combinatorial and algebraic schemes Extended models of attacks and generailizations for BE/TT

Combinatorial Methods

Better support for black-box tracing Larger key sizes Partial-leakage attacks

Algebraic Method

Generally more efficient Full collusion solutions still not satisfactory

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 37 / 42

slide-65
SLIDE 65

Open Questions

Fully Collusion Resistance

◮ Either the schemes are still quite inefficient ◮ Or the security is still not clear (e.g., composite order multi-linear

maps/iO)

Additional Features

◮ Efficient decentralised BE in a constant number of rounds ◮ Efficient anonymous BE

CCA lattice-based trace&revoke schemes Efficient construction from more general primitives?

◮ Attribute-based encryption ◮ Functional encryption

Tracing in electronic voting

Duong Hieu Phan Some Advances in BE&TT S´ eminaire LIPN 38 / 42