Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a static set of l legitimate users, then all traitors can be identified given the pirate key. In this paper we address three practicality and security issues of the Boneh-Franklin traitor- tracing scheme. In the first place, without changing the original scheme, we modify its tracing procedure in the non-black-box model such that it allows identification of k traitors in time Õ(k2), as opposed to the original tracing complexity Õ(l). This new tracing procedure works independently of the nature of the Reed-Solomon code used to watermark private keys. As a consequence, in applications with billions of users it takes just a few minutes on a common desktop computer to identify large collusions. Secondly, we exhibit the lack of practical value of list- decoding algorithms to identify more than k traitors. Finally, we show that 2k traitors can derive the keys of all legitimate users and we propose afixtothis security issue. © International Association for Cryptologic Research 2009.
CITATION STYLE
Junod, P., Karlov, A., & Lenstra, A. K. (2009). Improving the boneh-franklin traitor tracing scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5443, pp. 88–104). Springer Verlag. https://doi.org/10.1007/978-3-642-00468-1_6
Mendeley helps you to discover research relevant for your work.