544 results on '"Traitor tracing"'
Search Results
52. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
- Author
-
Tzeng, Wen-Guey, Tzeng, Zhi-Jia, Goos, Gerhard, Series Editor, Hartmanis, Juris, Advisory Editor, van Leeuwen, Jan, Advisory Editor, and Kim, Kwangjo, editor
- Published
- 2001
- Full Text
- View/download PDF
53. Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
- Author
-
Boneh, Dan and Zhandry, Mark
- Subjects
- *
DATA encryption , *INFORMATION science , *BILINEAR forms , *MULTIPARADIGM programming (Computer science) , *ENCRYPTION protocols , *COMPUTER networks - Abstract
In this work, we show how to use indistinguishability obfuscation to build multiparty key exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy several interesting properties that have not been achievable before: Several of our proofs of security introduce new tools for proving security using indistinguishability obfuscation. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
54. Hardness of k-LWE and Applications in Traitor Tracing.
- Author
-
Ling, San, Phan, Duong, Stehlé, Damien, and Steinfeld, Ron
- Subjects
- *
INDENTATION (Materials science) , *LATTICE dynamics , *EXPONENTIAL functions , *ALGEBRAIC codes , *SAMPLING (Process) - Abstract
We introduce the k- $$\mathrm {LWE}$$ problem, a Learning With Errors variant of the k-SIS problem. The Boneh-Freeman reduction from SIS to k-SIS suffers from an exponential loss in k. We improve and extend it to an LWE to k-LWE reduction with a polynomial loss in k, by relying on a new technique involving trapdoors for random integer kernel lattices. Based on this hardness result, we present the first algebraic construction of a traitor tracing scheme whose security relies on the worst-case hardness of standard lattice problems. The proposed $$\mathrm {LWE}$$ traitor tracing is almost as efficient as the $$\mathrm {LWE}$$ encryption. Further, it achieves public traceability, i.e., allows the authority to delegate the tracing capability to 'untrusted' parties. To this aim, we introduce the notion of projective sampling family in which each sampling function is keyed and, with a projection of the key on a well chosen space, one can simulate the sampling function in a computationally indistinguishable way. The construction of a projective sampling family from k- $$\mathrm {LWE}$$ allows us to achieve public traceability, by publishing the projected keys of the users. We believe that the new lattice tools and the projective sampling family are quite general that they may have applications in other areas. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
55. Blind 3D-Printing Watermarking Using Moment Alignment and Surface Norm Distribution
- Author
-
Yasuhiro Mukaigawa, Hiroyuki Kubo, Arnaud Delmotte, Kenichiro Tanaka, and Takuya Funatomi
- Subjects
Computer science ,Orientation (computer vision) ,business.industry ,Payload (computing) ,Context (language use) ,Watermark ,02 engineering and technology ,Computer Science Applications ,Traitor tracing ,Histogram ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,020201 artificial intelligence & image processing ,Computer vision ,Polygon mesh ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Digital watermarking - Abstract
The recent development of 3D printing technology has brought concerns about its potential misuse, such as in copyright infringement, and crimes. Although there have been many studies on blind 3D mesh watermarking for the copyright protection of digital objects, methods applicable to 3D printed objects are rare. In this paper, we propose a novel blind watermarking algorithm for 3D printed objects with applications for copyright protection, traitor tracing, object identification, and crime investigation. Our method allows us to embed a few bits of data into a 3D-printed object, and retrieve it by 3D scanning without requiring any information about the original mesh. The payload is embedded on the object's surface by slightly modifying the distribution of surface norms, that is, the distance between the surface, and the center of gravity. It is robust to resampling and can work with any 3D printer, and scanner technology. In addition, our method increases the capacity, and resistance by subdividing the mesh into a set of bins, and spreading the data over the entire surface to negate the effect of local printing artifacts. The method's novelties include extending the vertex norm histogram to a continuous surface, and the use of 3D moments to synchronize a watermark signal in a 3D-printing context. In the experiments, our method was evaluated using a public dataset against center, orientation, minimum, and maximum norm misalignments; a printing simulation; and actual print/scan experiments using a standard 3D printer, and scanner.
- Published
- 2021
- Full Text
- View/download PDF
56. You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center
- Author
-
Zihao Shan, Kui Ren, Leo Yu Zhang, Jian Weng, Yifeng Zheng, and Cong Wang
- Subjects
021110 strategic, defence & security studies ,business.industry ,Computer science ,0211 other engineering and technologies ,Cloud computing ,Access control ,Cryptography ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,Proxy re-encryption ,Outsourcing ,Traitor tracing ,Electrical and Electronic Engineering ,business ,Digital watermarking ,computer - Abstract
The wide adoption of cloud greatly facilitates the sharing of explosively generated media content today, yet deprives content providers’ direct control over the outsourced media content. Thus, it is pivotal to build an encrypted cloud media center where only authorized access is allowed. Enforcing access control alone, however, cannot fully protect content providers’ interests, as authorized users may later become traitors that illegally redistribute media content to the public. Such realistic threat should have been seriously treated yet is largely overlooked in the literature. In this paper, we initiate the first study on secure media sharing with fair traitor tracing in the encrypted cloud media center, through a new marriage of proxy re-encryption (for secure media sharing) and fair watermarking (for fair traitor tracing). Our key insight is to fully leverage the homomorphic properties residing in proxy re-encryption to embrace operations in fair watermarking. Two protocols are proposed for different application scenarios. We also provide complexity analysis for performance, showing that our work can also be treated as secure outsourcing of fair watermarking, and thus kills two birds with one stone. We thoroughly analyze the security strengths and conduct extensive experiments to validate the effectiveness of our design.
- Published
- 2020
- Full Text
- View/download PDF
57. Improved upper bounds for parent-identifying set systems and separable codes
- Author
-
Xin Wang
- Subjects
Discrete mathematics ,Distribution (number theory) ,business.industry ,Applied Mathematics ,020206 networking & telecommunications ,Cryptography ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Upper and lower bounds ,Computer Science Applications ,Separable space ,Set (abstract data type) ,010201 computation theory & mathematics ,Traitor tracing ,0202 electrical engineering, electronic engineering, information engineering ,business ,Broadcast encryption ,Order of magnitude ,Mathematics - Abstract
Parent-identifying set systems and separable codes are useful combinatorial structures which were introduced, respectively, for traitor tracing in broadcast encryption and collusion-resistant fingerprints for copyright protection. Determining the maximum size of such structures is the main research objective. New upper bounds are presented in this paper. Specifically, for parent-identifying set systems, we determine the order of magnitude of $$I_2(4,v)$$ and prove an exact bound when $$w\le \lfloor \frac{t^2}{4}\rfloor +t$$ . For q-ary separable codes, we give a new upper bound by estimating the distance distribution of such codes, improving the existing upper bound when q is relatively small.
- Published
- 2020
- Full Text
- View/download PDF
58. Efficient ciphertext-policy attribute-based encryption with blackbox traceability
- Author
-
Jiaming Yuan, Ximeng Liu, Yinghui Zhang, Yingjiu Li, Zuobin Ying, Shengmin Xu, and Guowen Xu
- Subjects
Scheme (programming language) ,Information Systems and Management ,Traceability ,Computer science ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,Theoretical Computer Science ,Artificial Intelligence ,Traitor tracing ,Ciphertext ,0202 electrical engineering, electronic engineering, information engineering ,Cryptosystem ,computer.programming_language ,business.industry ,05 social sciences ,Fingerprint (computing) ,050301 education ,Computer Science Applications ,Control and Systems Engineering ,020201 artificial intelligence & image processing ,Attribute-based encryption ,business ,0503 education ,computer ,Software - Abstract
Traitor tracing scheme is a paradigm to classify the users who illegal use of their decryption keys in cryptosystems. In the ciphertext-policy attribute-based cryptosystem, the decryption key usually contains the users’ attributes, while the real identities are hidden. The decryption key with hidden identities enables malicious users to intentionally leak decryption keys or embed the decryption keys in the decryption device to gain illegal profits with a little risk of being discovered. To mitigate this problem, the concept of blackbox traceability in the ciphertext-policy attribute-based scheme was proposed to identify the malicious user via observing the I/O streams of the decryption device. However, current solutions with blackbox traceability are impractical since either the composite-order group or the linear complexity of system users is required. In this article, we proposed a secure ciphertext-policy attribute-based set encryption scheme with the short decryption key. The proposed scheme bases on the prime-order group to improve computational performances and aggregates multiple attributes into a constant-size attribute set to reduce the costs of communication overheads. By applying our proposed scheme with fingerprint codes, we then give an instantiation of the ciphertext-policy attribute-based scheme with blackbox traceability. Our scheme is provably secure under various q-type assumptions.
- Published
- 2020
- Full Text
- View/download PDF
59. Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud
- Author
-
Brij B. Gupta and Mamta
- Subjects
020203 distributed computing ,Revocation ,Keyword search ,Computer science ,business.industry ,Strategy and Management ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,Computer Science Applications ,Human-Computer Interaction ,Traitor tracing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,computer - Abstract
Fine-grained searching is an important feature in multi-user cloud environment and a combination of attribute-based encryption (ABE) and searchable encryption (SE) is used to facilitate it. This combination provides a powerful tool where multiple data owners can share their data with multiple data users in an independent and differential manner. In this article, the authors have used key-policy design framework of attribute-based encryption to construct the multi-keyword search scheme where access rights assigned to a data user are associated with his/her secret key. This leads to a situation where a data user can abuse his secret key to distribute it illegally to the unauthorized users to perform search over the shared data which is not intended for him/her. Therefore, to track such kind of key abusers the authors have embedded an extra functionality of tracing the traitors. For this purpose, each user is assigned a unique identity in the form of binary string where each bit represents an attribute related to his identity. In addition to the normal attributes, the access structure of a user also possesses identity-related attributes which are hidden from the user along with some normal attributes. Hence, the proposed scheme supports partial anonymity. Further, in the event of user revocation the proposed scheme efficiently handles the system update process by delegating the computationally intensive tasks to the cloud server. Finally, the proposed scheme is proved secure under Decisional Bilinear Diffie-Hellman (DBDH) assumption and decision linear assumption in the selective security model.
- Published
- 2020
- Full Text
- View/download PDF
60. 基于广播加密的多策略非对称叛逆者追踪方案.
- Author
-
康桂花
- Abstract
Copyright of Journal of Chongqing University of Posts & Telecommunications (Natural Science Edition) is the property of Chongqing University of Posts & Telecommunications and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2016
- Full Text
- View/download PDF
61. Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining.
- Author
-
Czaplewski, Bartosz
- Subjects
- *
DATA encryption , *MULTIMEDIA communications , *CIPHERS , *COMPUTER simulation , *DATA compression , *QUATERNION functions , *ALGEBRA , *ROBUST statistics - Abstract
This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via multicast transmission to all users. The encryption involves rotation, and translation of points in 3D color space using quaternion algebra. Each user has a unique decryption key which is different from the encryption key. The differences between the common encryption key and the individual user’s decryption key cause the decrypted image to contain minor changes which are user’s fingerprint. A computer-based simulation was conducted to examine the method’s robustness against noise, compression, and collusion attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
62. 素数阶群上可追踪并撤销叛徒的ABE方案.
- Author
-
李作辉 and 陈性元
- Abstract
Traitor tracing and revocation is crucial to the use of attribute-based encryption (ABE). The previous adaptively secure ABE scheme for traitor tracing and revocation together (ABTR) suffered from superfluous computation overhead in that it was designed on composite order groups. To tackle this problem, this paper proposed an ABE scheme with generalized wildcards on prime order groups (PGWABE ) while applying dual pairing vector space approach, and proved the proposed scheme adaptively secure on the basis of dual system encryption along with a sequence of attacking games which was indistinguishable from each other. Furthermore, with the aid of complete subtree, this paper transformed PGWABE into an attribute-based encryption scheme for traitor tracing and revocation together on prime order groups (PABTR). Performance analysis indicates that compared with ABTR scheme, PABTR scheme is more efficient on an equivalent security level. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
63. Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe.
- Author
-
ZHEN LIU and WONG, DUNCAN S.
- Subjects
- *
DATA encryption , *BLACK box warnings , *DATA security , *SELF-expression , *MONOTONIC functions - Abstract
A blackbox traceable Attribute-Based Encryption (ABE) can identify a malicious user called traitor, which created a decryption box with respect to an attribute set (respectively, access policy), out of all the users who share the same attribute set (respectively, access policy). However, none of the existing traceable ABE schemes can also support revocation and large attribute universe, that is, being able to revoke compromised keys, and can take an exponentially large number of attributes. In this paper, we formalize the definitions and security models, and propose constructions of both Ciphertext-Policy ABE and Key-Policy ABE that support (i) public and fully collusion-resistant blackbox traceability, (ii) revocation, (iii) large universe and (iv) any monotonic access structures as policies (i.e. high expressivity).We also show that the schemes are secure and blackbox traceable in the standard model against selective adversaries. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
64. Almost separating and almost secure frameproof codes over $$q$$ -ary alphabets.
- Author
-
Moreira, José, Fernández, Marcel, and Kabatiansky, Grigory
- Subjects
HUMAN fingerprints ,ASYNCHRONOUS transfer mode ,COMPUTER programming ,ENCODING ,BIOMETRIC identification ,RAY tracing algorithms - Abstract
In this paper we discuss some variations of the notion of separating code for alphabets of arbitrary size. We show how the original definition can be relaxed in two different ways, namely almost separating and almost secure frameproof codes, yielding two different concepts. The new definitions enable us to obtain codes of higher rate, at the expense of satisfying the separating property partially. These new definitions become useful when complete separation is only required with high probability, rather than unconditionally. We also show how the codes proposed can be used to improve the rate of existing constructions of families of fingerprinting codes. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
65. ANSWERING n2+o(1) COUNTING QUERIES WITH DIFFERENTIAL PRIVACY IS HARD.
- Author
-
ULLMAN, JONATHAN
- Subjects
- *
QUERY (Information retrieval system) , *DATA privacy , *ALGORITHMS , *CRYPTOGRAPHY , *MATHEMATICAL proofs - Abstract
A central problem in differentially private data analysis is how to design efficient algorithms capable of answering large numbers of counting queries on a sensitive database. Counting queries are of the form "What fraction of individual records in the database satisfy the property q?" We prove that if one-way functions exist, then there is no algorithm that takes as input a database D ∈ ({0, 1}d)n, and k = Θ(n²) arbitrary efficiently computable counting queries, runs in time poly(d, n), and returns an approximate answer to each query, while satisfying differential privacy. We also consider the complexity of answering "simple" counting queries, and make some progress in this direction by showing that the above result holds even when we require that the queries are computable by constant-depth (AC0) circuits. Our result is almost tight because it is known that Ω(n²) counting queries can be answered efficiently while satisfying differential privacy. Moreover, many more than n² queries (even exponential in n) can be answered in exponential time. We prove our results by extending the connection between differentially private query release and cryptographic traitor-tracing schemes to the setting where the queries are given to the algorithm as input, and by constructing a traitor-tracing scheme that is secure in this setting. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
66. Novel two-level tracing scheme using clustering algorithm.
- Author
-
Chaabane, Faten, Charfeddine, Maha, and Amar, Chokri Ben
- Subjects
HUMAN fingerprints ,ASSET tracing ,TRAITORS ,COMPUTER user identification ,PROBABILITY theory - Abstract
In order to fight the phenomenon of intellectual piracy in multimedia distribution platforms, the traitor tracing technique, called also active fingerprinting was proposed by researchers as a suitable solution. In fact, the media producer, before distributing any release of his content, should proceed by embedding in each copy a unique fingerprint to identify its owner or its purchaser and even to allow the tracing process in case of piracy attack. In the same context, some tracing approaches proposed in the literature have deserved a considerable attention. The main assumption in these approaches is that users having common characteristics have more probability to collude together. Hence, using a group-based fingerprint in the tracing process should enhance the traitors' detection rates. In this paper, the traitor tracing scheme we propose consists of two major contributions: (1) the generation step of the group-based fingerprint by clustering the users' identifiers, and (2) the twolevel tracing process which is chosen adequately to be applied to the group-based structure of the fingerprint. In fact, in this strategy, the tracing levels is made in two successive steps: in the first one, guilty groups are accused using the Boneh Shaw code and in the second one, the retrieving back of traitorous users into these groups is made using the Tardos code. We evaluate the proposed tracing scheme against various types of collusion attacks: collusion into the same group and between different groups. Significant improvements using the proposed scheme are shown especially for two criteria: the detection rates, and the time taken by the accusation process to retrieve at least one colluder, confirmed by a comparison to the same scheme applied to non-clustered users' identifiers. [ABSTRACT FROM AUTHOR]
- Published
- 2016
67. Traceable and Weighted Attribute-Based Encryption Scheme in the Cloud Environment
- Author
-
Yongli Tang, Xixi Yan, Xiaohan Yuan, and Qichao Zhang
- Subjects
Theoretical computer science ,General Computer Science ,business.industry ,Computer science ,General Engineering ,access control ,Access control ,Cloud computing ,Encryption ,Secret sharing ,Set (abstract data type) ,Public-key cryptography ,Attribute-based encryption ,traceable ,Traitor tracing ,General Materials Science ,weighted attribute ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,Standard model (cryptography) - Abstract
In order to solve the problem that the importance of the user’s attribute is seldom considered in the most of the existing attribute-based encryption schemes with traitor tracing, we designed a traceable and weighted attribute-based encryption scheme. In our constructed scheme, the private key of the user consisting of user’s identity information is applied to trace traitors. In addition, the idea of weighted attribute is introduced, and the attributes set is transformed into the segmentation set of weighted attributes through the attributes set segmentation algorithm. Via employing a linear secret sharing scheme, the constructed scheme offers fine-grained and nimble access control mechanism. Under the assumption of q-BDHE in the standard model, we prove that the designed scheme is able to reach security against chosen-plaintext attack. By comparing with other relevant schemes, it has significant improvement in the costs of communication and computation, and it is more suitable for the application of the mobile terminal in cloud computing.
- Published
- 2020
68. Scene-based fingerprinting method for traitor tracing.
- Author
-
Mehta, Sachin, Nallusamy, Rajarathnam, and Prabhakaran, Balakrishnan
- Subjects
- *
COPYRIGHT infringement , *DIGITAL watermarking , *TWO-dimensional bar codes , *SIGNAL processing , *SYNCHRONIZATION software - Abstract
In this paper, scene-based fingerprinting method for traitor tracing is proposed which is computationally less complex and handles large user group, say 10 users while requiring few frames to embed the watermark. The proposed method uses QR code as a watermark due to its three main features: (1) inherent templates, (2) noise resiliency, and (3) compact size. The proposed method creates the QR code watermark on-the-fly which is then segmented and embedded parallely inside the scenes of video using the watermarking key. The features of QR code, segmentation, and watermarking key not only help the proposed method in supporting a large user group but also make it computationally fast. Further, synchronization issues may arise due to addition and deletion of scenes. To avoid such scenarios, the proposed method matches the inherent templates present in QR code with the templates present in the segments of the extracted watermark. Experimental results show that the proposed method is computationally efficient and is robust against attacks such as collusion, scene dropping, scene addition, and other common signal processing attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
69. Asymptotics of fingerprinting and group testing: capacity-achieving log-likelihood decoders.
- Author
-
Laarhoven, Thijs
- Subjects
HUMAN fingerprints ,GROUP testing ,LIKELIHOOD ratio tests - Abstract
We study the large-coalition asymptotics of fingerprinting and group testing and derive explicit decoders that provably achieve capacity for many of the considered models. We do this both for simple decoders (which are fast but commonly require larger code lengths) and for joint decoders (which may be slower but achieve the best code lengths). We further make the distinction between informed decoding, where the pirate strategy is exactly known, and uninformed decoding, and we design decoding schemes for both settings. For fingerprinting, we show that if the pirate strategy is known, the Neyman-Pearson-based log-likelihood decoders provably achieve capacity, regardless of the strategy. The decoder built against the interleaving attack is further shown to be a universal decoder, able to deal with arbitrary attacks and achieving the uninformed capacity. This universal decoder is shown to be closely related to the Lagrange-optimized decoder of Oosterwijk et al. and the empirical mutual information decoder of Moulin. Joint decoders are also proposed, and we conjecture that these also achieve the corresponding joint capacities. For group testing, the simple decoder for the classical model is shown to be more efficient than the one of Chan et al. and it provably achieves the simple group testing capacity. For generalizations of this model such as noisy group testing, the resulting simple decoders also achieve the corresponding simple capacities. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
70. A collusion attack on asymmetric group key exchange.
- Author
-
Teng, Jikai and Wu, Chuankun
- Subjects
PUBLIC key cryptography ,COLLUSION ,DATA encryption ,COMPUTER network protocols ,COMPUTER access control - Abstract
In Eurocrypt 2009, Wu et al. introduced the notion of asymmetric group key agreement (ASGKA) and presented a generic construction of ASGKA protocols with one communication round. Most of ASGKA protocols are designed under that generic construction. In asymmetric group key agreement protocols, users obtain different decryption keys. Any subset of group members may collude to construct pirate decryption keys, which are different from those of colluders but can correctly decrypt ciphertexts. If a pirate decryption box is found, it is possible to find traitors since their decryption keys are related to their identities. In this paper, a collusion attack on the generic construction of ASGKA by Wu et al. is proposed. It is formally proved that each of colluders participating in the proposed collusion attack is unable to be traced. The attack is additionally applied to a concrete protocol to exemplify the collusion attack. Copyright © 2014 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
71. A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes.
- Author
-
Oosterwijk, Jan-Jaap, Skoric, Boris, and Doumen, Jeroen
- Subjects
- *
TRAITORS , *LINEAR network coding , *WIRELESS sensor networks , *INFORMATION theory - Abstract
We investigate alternative suspicion functions for bias-based traitor tracing schemes, and present a practical construction of a simple decoder that attains capacity in the limit of large coalition size c . We derive optimal suspicion functions in both the restricted-digit model and the combined-digit model. These functions depend on information that is usually not available to the tracer—the attack strategy or the tallies of the symbols received by the colluders. We discuss how such results can be used in realistic contexts. We study several combinations of coalition attack strategy versus suspicion function optimized against some attack (another attack or the same). In many of these combinations, the usual codelength scaling \ell \propto c^{2} changes to a lower power of c$ , e.g., c^{3/2} . We find that the interleaving strategy is an especially powerful attack. The suspicion function tailored against interleaving is the key ingredient of the capacity-achieving construction. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
72. Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia.
- Author
-
Czaplewski, Bartosz and Rykaczewski, Roman
- Subjects
- *
MATRICES (Mathematics) , *ROBUST control , *DATA encryption , *MULTICASTING (Computer networks) , *MULTIMEDIA communications - Abstract
This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix multiplication to encrypt images which are then sent to all users via multicast transmission. Individual decryption keys are designed depending on the users’ fingerprints so that a different fingerprint will be introduced into the image during decryption for each unique decryption key. Encryption and fingerprinting are performed on DCT coefficients, which results in high robustness against compression, low-pass filtering, scaling, etc. The experimental results show that the proposed method is robust against collusion attacks and compression. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
73. False positive probabilities in q-ary Tardos codes: comparison of attacks.
- Author
-
Simone, Antonino and Škorić, Boris
- Subjects
PROBABILITY theory ,MATHEMATICAL series ,APPROXIMATION theory ,PARAMETER estimation ,STOCHASTIC convergence - Abstract
We investigate false positive (FP) accusation probabilities for $$q$$ -ary Tardos codes in the Restricted Digit Model. We employ a computation method recently introduced by us, to which we refer as Convolution and Series Expansion (CSE). We present a comparison of several collusion attacks on $$q$$ -ary codes: majority voting, minority voting, Interleaving, $$\tilde{\mu }$$ -minimizing and Random Symbol (the $$q$$ -ary equivalent of the Coin Flip strategy). The comparison is made by looking at the FP rate at approximately fixed False Negative rate. In nearly all cases we find that the strongest attack is either minority voting or $$\tilde{\mu }$$ -minimizing, depending on the exact setting of parameters such as alphabet size, code length, and coalition size. Furthermore, we present results on the convergence speed of the CSE method, and we show how FP rate computations for the Random Symbol strategy can be sped up by a pre-computation step. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
74. Tally-Based Simple Decoders for Traitor Tracing and Group Testing.
- Author
-
Skoric, Boris
- Abstract
The topic of this paper is collusion resistant watermarking, also known as traitor tracing, in particular bias-based traitor tracing codes as introduced by Tardos. The past years have seen an ongoing effort to construct efficient high-performance decoders for these codes. In this paper we construct a score system from the Neyman-Pearson hypothesis test (which is known to be the most powerful test possible) into which we feed more evidence than in previous work, in particular the symbol tallies for all columns of the code matrix. As far as we know, until now simple decoders using Neyman-Pearson have taken into consideration only the codeword of a single user, namely the user under scrutiny. The Neyman–Pearson score needs as input the attack strategy of the colluders, which typically is not known to the tracer. We insert the interleaving attack, which plays a very special role in the theory of bias-based traitor tracing by virtue of being part of the asymptotic (i.e., large coalition size) saddle-point solution. The score system obtained in this way is universal: effective not only against the interleaving attack, but against all other attack strategies as well. Our score function for one user depends on the other users’ codewords in a very simple way through the symbol tallies, which are easily computed. We present bounds on the false positive probability and show receiver operating characteristic curves obtained from simulations. We investigate the probability distribution of the score. Finally, we apply our construction to the area of (medical) group testing, which is related to traitor tracing. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
75. Study on Watermarking Relational Databases
- Author
-
Mayuree K. Rathva and G. J. Sahani
- Subjects
Information retrieval ,business.industry ,Relational database ,Computer science ,database watermarking ,multi-place watermarking ,Subject (documents) ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Information security ,Database security ,computer.software_genre ,Relational database management system ,Traitor tracing ,The Internet ,copyright protection ,business ,computer ,Digital watermarking - Abstract
The use of digital watermarking to secure the content of database systems is a new research direction in information security. Until now, the majority of the work has been based on image, video and audio. However, because of the growing use of relational database systems, database watermarking has become a research subject. Which addresses the legal issue of database system copyright protection. In this paper, we have focused on the review of four relational database watermarking techniques proposed by researchers [R. Agarwal & Jerry Kiernan, ZHU Qin, Brijesh B. Mehta, A. Al-Haj and Ali Hamadou]. The security of relational databases has been a great concern since the expanded use of these data over the Internet. Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing and maintaining integrity of relational data.
- Published
- 2021
- Full Text
- View/download PDF
76. Fast Fallback Watermark Detection Using Perceptual Hashes
- Author
-
Glenn Van Wallendael, Peter Lambert, Hannes Mareen, and Niels Van Kets
- Subjects
Technology and Engineering ,TK7800-8360 ,Computer Networks and Communications ,Computer science ,Hash function ,Data_MISCELLANEOUS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,02 engineering and technology ,Tracing ,Perceptual hashing ,ROBUST WATERMARKING ,watermark detection ,DOMAIN ,Traitor tracing ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Computer vision ,ALGORITHM ,Electrical and Electronic Engineering ,content-based fingerprinting ,Digital watermarking ,IMAGE COPY DETECTION ,perceptual hashing ,ARCHITECTURE ,business.industry ,REAL-TIME ,SCHEME ,watermarking ,020206 networking & telecommunications ,Watermark ,Uncompressed video ,traitor tracing ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,020201 artificial intelligence & image processing ,Artificial intelligence ,fallback ,Electronics ,business ,VIDEO ,SYSTEM - Abstract
Forensic watermarking is often used to enable the tracing of digital pirates that leak copyright-protected videos. However, existing watermarking methods have a limited robustness and may be vulnerable to targeted attacks. Our previous work proposed a fallback detection method that uses secondary watermarks rather than the primary watermarks embedded by existing methods. However, the previously proposed fallback method is slow and requires access to all watermarked videos. This paper proposes to make the fallback watermark detection method faster using perceptual hashes instead of uncompressed secondary watermark signals. These perceptual hashes can be calculated prior to detection, such that the actual detection process is sped up with a factor of approximately 26,000 to 92,000. In this way, the proposed method tackles the main criticism about practical usability of the slow fallback method. The fast detection comes at the cost of a modest decrease in robustness, although the fast fallback detection method can still outperform the existing primary watermark method. In conclusion, the proposed method enables fast and more robust detection of watermarks that were embedded by existing watermarking methods.
- Published
- 2021
77. Analysis of Set-cover traitor tracing scheme.
- Author
-
Liu, Fen and Gui Zhang
- Abstract
In this paper, we report our work to analyze the false positive of the Set-cover probabilistic traitor tracing scheme. The Set-cover scheme was proposed to trace a coalition of traitors simultaneously. Comparing with most tracing schemes, the Set-cover scheme identifies more traitors per tracing. The authors of Set-cover scheme claimed their scheme greatly reduced the false positive and increased the tracing efficiency. They also claimed the Set-cover scheme is a good candidate to replace the tracing scheme used in the standard AACS (Advanced Access Content System). However, we present an Enclosure attack to challenge the Set-cover scheme. With the attack we can frame multi innocent users at one time with unnegligible probability no matter how many movies are detected, namely, the false positive of Set-cover scheme is much higher than the authors claimed. Both of our theoretical results and experimental results show that 39 arbitrary users can successfully frame 7 users with a probability bigger than 80%, which means the false positive is bigger than 80%. Obviously, such a false positive is too high to be applied in practice. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
78. Joint Fingerprinting and Decryption for VQ Images through Bipartite Matching.
- Author
-
Prangjarote, Panyaporn, Lin, Chih-Yang, Kang, Li-Wei, and Yeh, Chia-Hung
- Abstract
The legality of redistribution of digital content over the Internet has become critical in commerce. the goal of the traitor tracing problem is to find out the traitor who illegally distributes the digital content. in this paper, a joint fingerprinting and decryption (JFD) scheme based on vector quantization and bipartite matching for traitor tracing is proposed. before transmission, the proposed method encrypts the VQ compressed image through bipartite graphs. after the receiver performs decryption and fingerprinting, the recover image containing user¡¦s fingerprint is only slightly different from the original one and can be used for traitor tracing. the experimental results show that the encrypted image possesses unintelligibility and the recovered image has desirable image quality greatly related to the codebook size. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
79. White Box Traitor Tracing
- Author
-
Mark Zhandry
- Subjects
Black box (phreaking) ,Theoretical computer science ,Computer science ,Traitor tracing ,Data_CODINGANDINFORMATIONTHEORY ,Tracing ,White box - Abstract
Traitor tracing aims to identify the source of leaked decryption keys. Since the “traitor” can try to hide their key within obfuscated code in order to evade tracing, the tracing algorithm should work for general, potentially obfuscated, decoder programs. In the setting of such general decoder programs, prior work uses black box tracing: the tracing algorithm ignores the implementation of the decoder, and instead traces just by making queries to the decoder and observing the outputs.
- Published
- 2021
- Full Text
- View/download PDF
80. Construction of multi-user cryptosystems
- Author
-
Do, Xuan Thanh, STAR, ABES, XLIM (XLIM), Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS), Université de Limoges, Đại học Quốc gia Thành phố Hồ Chí Minh (Thành phố Hồ Chí Minh), Duong Hieu Phan, and Minh Ha Le
- Subjects
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Broadcast encryption ,Traitor tracing ,Chiffrement fonctionnel ,Functional encryption ,La révocation ,Trace & revoke ,Traceable functional encryption ,Diffusion chiffrée ,Revocation ,Traçage de traîtres ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] - Abstract
This thesis considers a number of challenging aspects in multi-user cryptosystems such as traitor tracing, broadcast encryption, trace & revoke, and functional encryption. While a broadcast encryption scheme ensures the confidentiality of digital content against unauthorized users in the system, traitor tracing is an important tool to prevent authorized users from sharing decryption keys outside because if so, the tracer, with the help of the traitor tracing algorithm, will identify which user has disclosed information. In the first part, we focus on privacy in broadcast encryption schemes. We propose an anonymous broadcast encryption scheme in the bounded model (AnoBEB) whose security is based on the k-LWE assumption, which is a variant of the learning with errors (LWE) assumption. Our construction enjoys optimal efficiency (as efficient as LWE encryption) in the case where the number of users is bounded. In the second part, we integrate the proposed AnoBEB system with a robust identifiable parent property code (IPP) into a traceable scheme. Moreover, we achieve a very strong functionality scheme, also covering revocation and thus yielding the first trace & revoke scheme from a traceability code. Our construction becomes the most efficient trace & revoke scheme for standard black-box tracing in the bounded collusion model. The third part deals with traitor tracing algorithms for functional encryption. We introduce a new primitive, which is called {em traceable functional encryption}. We then formalize the notion of security and provide a concrete construction for {em traceable inner product functional encryption} (traceable IPFE). The proposed construction relies on pairings. It enjoys a high efficiency and achieves black-box confirmation. Finally, we recall the notion of {em revocable functional encryption}. We provide several pairing-based constructions for inner product functional encryption with short ciphertexts or decryption keys. We will then extend this notion to the {em fine-grained revocable functional encryption} and propose a candidate construction for fine-grained revocable inner product functional encryption., Cette thèse considère des aspects principaux dans les cryptosystèmes multi-utilisateurs tels que la diffusion de données chiffrées, la révocation, le traçage des traîtres et le chiffrement fonctionnel. Alors qu'un schéma de diffusion de données chiffrées garantit la confidentialité du contenu numérique contre les utilisateurs non autorisés du système, le traçage des traîtres est un outil important pour empêcher les utilisateurs autorisés de partager les clés de déchiffrement à l'extérieur.Dans la première partie, nous revisitons la privacy dans les schémas de diffusion de données chiffrées. Nous proposons un schéma anonyme (AnoBEB) dont la sécurité est basée sur l'hypothèse k-LWE, qui est une variante de l'hypothèse d'apprentissage avec erreurs (LWE). Notre construction bénéficie d'une efficacité optimale (aussi efficace que le chiffrement LWE) dans le cas où le nombre d'utilisateurs est borné. Dans la deuxième partie, nous intégrons le système AnoBEB proposé avec un code traçable IPP robuste dans un schéma de traçage de traîtres. De plus, nous obtenons également une propriété de révocation et produisons ainsi le premier schéma de trace & revoke à partir d'un code traçable. Notre construction devient le schéma de trace & revoke le plus efficace pour le traçage en boîte noire dans le modèle de collusion bornée. La troisième partie traite des algorithmes de traçage des traîtres pour le chiffrement fonctionnel. Nous introduisons dans un premier temps une nouvelle primitive, appelée traceable functional encryption (TFE). Nous formalisons ensuite la notion de sécurité et fournissons une construction concrète du TFE dans le cas du produit scalaire ( traceable IPFE). La construction proposée repose sur des couplages sur des courbes elliptiques, est très efficace et obtient le niveau de traçabilité dit de black-box confirmation. Enfin, nous rappelons la notion de revocable functional encryption. Nous fournissons plusieurs constructions basées sur les couplages pour le chiffrement fonctionnel dans le cas du produit scalaire avec des textes chiffrés courts ou des clés de déchiffrement courts. Nous étendrons ensuite cette notion au fine-grained revocable functional encryption et proposerons une construction candidate pour fine-grained revocable inner product functional encryption.
- Published
- 2021
81. Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video
- Author
-
William Puech, Chokri Ben Amar, Karama Abdelhedi, and Faten Chaabane
- Subjects
Identifier ,Identification (information) ,Least significant bit ,Computer science ,Traitor tracing ,Robustness (computer science) ,Watermark ,Data mining ,Tracing ,computer.software_genre ,Digital watermarking ,computer - Abstract
Securing multimedia content and preventing it from being maliciously manipulated has developed at a rapid pace, and researchers have been studying the traitor tracing as an appropriate solution. This approach consists in retrieving back the actors who contributed to the construction of an illegal release of a multimedia product. It includes two major steps which are the fingerprinting step and the tracing one. The fingerprinting step relies on the watermarking technique whereas the efficiency of the tracing scheme depends on several requirements: the robustness of the watermarking technique, the type of the media content, and even the computational complexity. In this paper, we propose a new collusion-secure fingerprinting scheme for 3D videos. It has essentially a twofold purpose: at a first step, we propose to embed the watermark in the video copy by applying a standard Least Significant Bit (LSB) substitution to all the frames of both the 2D video and the depth map components in order to ensure simultaneously and independently the protection of these two parts. In the second step, we apply the tracing process whose target is the identification of eventual colluders by extracting the hidden identifier from the suspicious video and analyse it. Experimental assessments show that the proposed scheme provides interesting results in terms of speed and tracing accuracy constraints.
- Published
- 2021
- Full Text
- View/download PDF
82. Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures
- Author
-
Takahiro Matsuda, Tadanori Teruya, Kanta Matsuura, Kyosuke Yamashita, Yusuke Sakai, Tsutomu Matsumoto, Goichiro Hanaoka, and Ryu Ishii
- Subjects
Traceability ,Traitor tracing ,Computer science ,Aggregate (data warehouse) ,Data mining ,Tracing ,computer.software_genre ,Measure (mathematics) ,Wireless sensor network ,computer ,Signature (logic) ,TRACE (psycholinguistics) - Abstract
Aggregate signature schemes enable us to aggregate multiple signatures into a single short signature. One of its typical applications is sensor networks, where a large number of users and devices measure their environments, create signatures to ensure the integrity of the measurements, and transmit their signed data. However, if an invalid signature is mixed into aggregation, the aggregate signature becomes invalid, thus if an aggregate signature is invalid, it is necessary to identify the invalid signature. Furthermore, we need to deal with a situation where an invalid sensor generates invalid signatures probabilistically. In this paper, we introduce a model of aggregate signature schemes with interactive tracing functionality that captures such a situation, and define its functional and security requirements and propose aggregate signature schemes that can identify all rogue sensors. More concretely, based on the idea of Dynamic Traitor Tracing, we can trace rogue sensors dynamically and incrementally, and eventually identify all rogue sensors of generating invalid signatures even if the rogue sensors adaptively collude. In addition, the efficiency of our proposed method is also sufficiently practical.
- Published
- 2021
- Full Text
- View/download PDF
83. Connecting Theory and Practice in Modern Cryptography
- Author
-
Kumarasubramanian, Abishek
- Subjects
Computer science ,Captcha ,Cryptography ,Security ,Traitor Tracing ,Zero Knowledge - Abstract
Cryptography is an active field of theoretical research. It is also a place where many unproven,but time-tested practical ideas exist. This work exposits a few strands that connectthese two sides of the Cryptographic coin.The two main results presented are,1. The first traitor tracing scheme based on prime order bilinear groups. While primeorder bilinear groups are practical, existing schemes for traitor tracing were basedon the more structurally rich, but much less practical composite order bilinear groups.Our work brings the rich structure of composite order bilinear groups and the efficiencyof prime order groups together.2. A formal model for CAPTCHAs which captures the intuition that any automatonmust request human help to solve CAPTCHA problems. We use this model to obtainpositive results in the eld of concurrent security. This is the first result that bringsCAPTCHA, a widely adopted practical security tool, into main stream cryptographyto achieve tasks that are known to be theoretically impossible in the plain model.
- Published
- 2014
84. Binary and $$q$$ -ary Tardos codes, revisited.
- Author
-
Škorić, Boris and Oosterwijk, Jan-Jaap
- Subjects
BINARY codes ,MATHEMATICAL inequalities ,HUMAN fingerprints ,COMPUTER security ,PROBABILITY theory ,MATHEMATICAL bounds - Abstract
The Tardos code is a much studied collusion-resistant fingerprinting code, with the special property that it has asymptotically optimal length $$m\propto c_0^2$$ , where $$c_0$$ is the number of colluders. In this paper we give alternative security proofs for the Tardos code, working with the assumption that the strongest coalition strategy is position-independent. We employ the Bernstein inequality and Bennett inequality instead of the typically used Markov inequality. This proof technique requires fewer steps and slightly improves the tightness of the bound on the false negative error probability. We present new results on code length optimization, for both small and asymptotically large coalition sizes. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
85. False Negative probabilities in Tardos codes.
- Author
-
Simone, Antonino and Škorić, Boris
- Subjects
PROBABILITY theory ,DIGITAL watermarking ,MATHEMATICAL convolutions ,SERIES expansion (Mathematics) ,GENERALIZATION ,CYBERTERRORISM - Abstract
Forensic watermarking is the application of digital watermarks for the purpose of tracing unauthorized redistribution of content. One of the most powerful types of attack on watermarks is the collusion attack, in which multiple users compare their differently watermarked versions of the same content. Collusion-resistant codes have been developed against these attacks. One of the most famous such codes is the Tardos code. It has the asymptotically optimal property that it can resist $$c$$ attackers with a code of length proportional to $$c^2$$ . Determining error rates for the Tardos code and its various extensions and generalizations turns out to be a nontrivial problem. In recent work we developed an approach called the convolution and series expansion (CSE) method to accurately compute false positive accusation probabilities. In this paper we extend the CSE method in order to make it possible to compute a bound on the False Negative accusation probabilities. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
86. Unbounded Key-Policy Attribute-Based Encryption with Black-Box Traceability
- Author
-
Jiachen Shen, Yunxiu Ye, and Zhenfu Cao
- Subjects
Black box (phreaking) ,021110 strategic, defence & security studies ,Traceability ,business.industry ,Computer science ,0211 other engineering and technologies ,02 engineering and technology ,Tracing ,Computer security ,computer.software_genre ,Encryption ,Public-key cryptography ,Traitor tracing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Attribute-based encryption ,business ,Broadcast encryption ,computer - Abstract
Attribute-based encryption received widespread attention as soon as it proposes. However, due to its specific characteristics, the attribute-based access control method is not flexible enough in actual operation. In addition, since access authorities are determined according to users' attributes, users sharing the same attributes are difficult to distinguish. Once a malicious user makes illicit gains by their decryption authorities, it is difficult to trace specific users. This paper follows the practical demand to propose a more flexible key-policy attribute-based encryption scheme with black-box traceability. The scheme has a constant number of constant parameters which can be utilized to construct attribute-related parameters flexibly, and the method of traitor tracing in broadcast encryption is introduced to achieve effective malicious user tracing. In addition, the security and feasibility can be proved by the security proofs and performance evaluation in this paper.
- Published
- 2020
- Full Text
- View/download PDF
87. A Deep Learning Framework Supporting Model Ownership Protection and Traitor Tracing
- Author
-
Robert H. Deng, Xuemin Shen, Xiaodong Lin, Guowen Xu, Yuan Zhang, and Hongwei Li
- Subjects
021110 strategic, defence & security studies ,Computer science ,business.industry ,Deep learning ,Fingerprint (computing) ,0211 other engineering and technologies ,020206 networking & telecommunications ,02 engineering and technology ,Fingerprint recognition ,Machine learning ,computer.software_genre ,Traitor tracing ,0202 electrical engineering, electronic engineering, information engineering ,Artificial intelligence ,business ,computer ,Digital watermarking ,TRACE (psycholinguistics) - Abstract
Cloud-based deep learning (DL) solutions have been widely used in applications ranging from image recognition to speech recognition. Meanwhile, as commercial software and services, such solutions have raised the need for intellectual property rights protection of the underlying DL models. Watermarking is the mainstream of existing solutions to address this concern, by primarily embedding pre-defined secrets in a model's training process. However, existing efforts almost exclusively focus on detecting whether a target model is pirated, without considering traitor tracing. In this paper, we present SecureMark_DL, which enables a model owner to embed a unique fingerprint for every customer within parameters of a DL model, extract and verify the fingerprint from a pirated model, and hence trace the rogue customer who illegally distributed his model for profits. We demonstrate that SecureMark_DL is robust against various attacks including fingerprints collusion and network transformation (e.g., model compression and model fine-tuning). Extensive experiments conducted on MNIST and CIFAR10 datasets, as well as various types of deep neural network show the superiority of SecureMark_DL in terms of training accuracy and robustness against various types of attacks.
- Published
- 2020
- Full Text
- View/download PDF
88. FHPT: Fine-Grained EHR Sharing in E-Healthcare Cloud with Hidden Policy and Traceability
- Author
-
Shengmin Xu, Ximeng Liu, Yuanping Si, Jianfeng Ma, and Zuobin Ying
- Subjects
021110 strategic, defence & security studies ,Traceability ,business.industry ,Computer science ,Information sharing ,0211 other engineering and technologies ,020207 software engineering ,Access control ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,Outsourcing ,Traitor tracing ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,business ,computer - Abstract
E-healthcare cloud remarkably facilitates patients to outsource their electronic health record (EHR) to achieve large-scale information sharing in real-time for improving the efficiency of diagnosis and treatment. Unfortunately, compared with other outsourced data, EHR contains more personal privacy, which makes it more preferred by the adversaries. Besides, in the e-healthcare cloud, there may exist malicious users who deliberately disclose their access privileges to obtain financial benefits. In this paper, we propose a fine-grained EHR sharing scheme in e-healthcare cloud with hidden policy and traceability. Specifically, we present a new black-box traitor tracing scheme based on partial policy hiding attribute-based encryption and it performs fine-grained access control on the encrypted EHR, which not only prevents privacy leakage from access policy but also effectively track malicious users who leak decryption privileges to construct a black-box. Our scheme is proved to be fully secure under the standard model. Performance analysis shows that the scheme can achieve the design goals in terms of storage and computation overhead. In the meantime, it is more efficient than the existing schemes under the composite order group.
- Published
- 2020
- Full Text
- View/download PDF
89. Attack and improvement of the joint fingerprinting and decryption method for vector quantization images.
- Author
-
Li, Ming, Xiao, Di, Zhang, Yushu, and Liu, Hong
- Subjects
- *
HUMAN fingerprints , *VECTOR quantization , *IMAGE processing , *DATA encryption , *ROBUST control , *EMBEDDINGS (Mathematics) - Abstract
Abstract: The first joint fingerprinting and decryption (JFD) scheme proposed by Lin et al. in 2012 aims to protect the distribution of vector quantization (VQ) images. If the decrypted image is illegally redistributed, the fingerprint embedded in the image can be used to trace the traitor. However, this scheme is not secure enough, and it can be broken by a novel attack method proposed in this paper. The embedded fingerprint can be replaced arbitrarily, and therefore the traitor tracing would fail. Besides, the intercepted encrypted image using the static key-trees based approach of the original scheme is also cracked. To make improvements, a new JFD method using codebook partition is proposed. Experiments and analyses show that the proposed method outperforms the original one: the security is enhanced; both the robustness and fragileness are equipped; the fingerprint extraction is simplified; the distortion is limited; and at the same time, the computation and communication overheads are not increased. [Copyright &y& Elsevier]
- Published
- 2014
- Full Text
- View/download PDF
90. Reversible joint fingerprinting and decryption based on side match vector quantization.
- Author
-
Lin, Chih-Yang, Prangjarote, Panyaporn, Yeh, Chia-Hung, and Ng, Hui-Fuang
- Subjects
- *
HUMAN fingerprints , *CRYPTOGRAPHY , *VECTOR quantization , *CONFIDENTIAL communications , *IMAGE analysis , *SIGNAL-to-noise ratio - Abstract
Abstract: This paper proposes a joint fingerprinting and decryption (JFD) based on side match vector quantization (SMVQ) for transmitting confidential information and traitor tracing in multimedia distribution. With the help of SMVQ, the proposed scheme can extract the fingerprint without referring to the original image. In addition, after the extraction of the fingerprint, the fingerprinted copy can be completely recovered to the un-fingerprinted version. The experimental results show that the proposed scheme can achieve high perceptual security (with PSNR below 12 on average), high fingerprinted visual quality (with PSNR above 28 on average), and desirable fingerprint payload (about 0.6bit/per block). [Copyright &y& Elsevier]
- Published
- 2014
- Full Text
- View/download PDF
91. Design of white-box encryption schemes for mobile applications security
- Author
-
Rasoamiaramanana, Sandra, Cryptology, arithmetic : algebraic methods for better algorithms (CARAMBA), Department of Algorithms, Computation, Image and Geometry (LORIA - ALGO), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria), Université de Lorraine, and Marine Minier
- Subjects
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Cryptographie boîte blanche ,Obfuscation ,Traitor tracing ,White Box Cryptographie ,Traçage de traîtres ,PUF - Abstract
Today mobile devices are an integral part of our lives with the development of applications. In addition to smart phones, which are increasingly powerful, other devices such as connected objects may have to handle data that must remain secret. For example, the authentication of a connected object in a network requires the existence of a ``secret" held by the object. In the case of mobile applications, the emergence of payment applications allowing contactless payment from the telephone or banking applications poses serious security challenges. The need to secure applications is therefore essential both for users wishing to access a service without risking their goods and for service providers who have a financial interest in it. Thus, cryptography is used to protect these various mobile applications. In this context, we wish to meet this need with both a software and hardware approach to secure cryptography on open and exposed platforms. The aim of this thesis is to verify the security of software implementations of cryptographic algorithms in the white-box model and to propose techniques to reinforce this security in a mobile environment. The white-box model or white-box attacks context is opposed to the traditional black-box model and refers to a context in which an attacker controls an execution environment and has access to software implementations of cryptographic algorithms. Once a secret key is revealed, the security of the encryption scheme is no longer valid. In this context, the last line of defense is the implementation itself: the secret key is hidden in the code so that it cannot be distinguished or extracted. Many studies have been conducted on White-Box Cryptography and have led to proposals for white-box implementations of standardized algorithms such as the DES (Data Encryption Standard) or the AES (Advanced Encryption Standard). These algorithms are of particular interest due to their wide deployment. Unfortunately these proposals have revealed vulnerabilities and do not guarantee the confidentiality of the secret key. In this thesis, we are first interested in the reasons why not all proposed implementations allow to ``hide'' the secret key sufficiently. We will make a detailed study of the techniques used as well as the possible attacks. Secondly, we propose new techniques to counter these attacks and study the cost of these techniques in terms of code size and performance. Another approach in White-Box Cryptography is to design algorithms that can be proved to be resistant to key extraction. This new approach involves proposing security notions adapted to the white-box model. In particular, the main problem is to ensure that the implementation of the cryptographic algorithm cannot be copied and executed in another environment. This attack called "code lifting" (code copying) is equivalent to extracting the secret key. One solution proposed in the literature is to increase the size of the code in order to increase the space complexity of the attack. We propose a solution to this problem by defining an encryption scheme that can be implemented in a white-box and that uses a physical device called Physically Unclonable Function (PUF). A PUF refers to a physical device with unique and unclonable characteristics that can be used to identify it. Thus, a PUF can be seen as the fingerprint (in the biometric sense) of a device. The PUF will be used in our scheme as a means of identifying the execution environment of a cryptographic algorithm and will generate a key specific to a given device.; Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des applications. En plus des téléphones intelligents, d'autres équipements comme les objets connectés peuvent avoir à manipuler des données qui doivent rester secrètes. Par exemple, l'authentification d'un objet connecté dans un réseau nécessite l'existence d'un "secret" détenu par l'objet. Dans le cas des applications mobiles, l'apparition des applications de paiement permettant un paiement sans contact à partir du téléphone ou encore les applications bancaires pose de sérieux enjeux de sécurité. Le besoin de sécurisation des applications est ainsi primordial à la fois pour un utilisateur désireux d'accéder à un service sans risquer ses biens mais aussi pour les fournisseurs de services qui y ont un intérêt financier. Ainsi, la cryptographie est utilisée pour protéger ces diverses applications mobiles. Dans ce contexte, on souhaite répondre à ce besoin avec une approche à la fois logicielle et matérielle pour sécuriser la cryptographie sur des plateformes ouvertes et exposées. Le but de cette thèse est de vérifier la sécurité des implémentations logicielles d’algorithmes cryptographiques dans le modèle boîte blanche et de proposer des techniques permettant de renforcer cette sécurité dans un environnement mobile. Le modèle boîte blanche s’oppose au modèle boîte noire traditionnel et décrit un contexte dans lequel un attaquant contrôle l'environnement d’exécution et a accès aux implémentations logicielles. Une fois qu'une clé secrète est révélée, la sécurité du schéma de chiffrement n’est plus valable. Dans ce contexte, la dernière ligne de défense est l’implémentation elle-même : la clé secrète est cachée dans le code de manière à ce qu’elle ne puisse être ni identifiée, ni extraite. De nombreuses études ont été menées sur la cryptographie en boîte blanche et ont abouti à des propositions d’implémentations d’algorithmes standardisés tels que le DES (Data Encryption Standard) ou l’AES (Advanced Encryption Standard). Ces algorithmes intéressent particulièrement du fait de leur large déploiement. Malheureusement ces propositions ont révélé des vulnérabilités et ne garantissent pas la confidentialité de la clé secrète. Dans cette thèse, nous nous intéressons premièrement aux raisons pour lesquelles toutes les propositions d’implémentations ne permettent pas de "cacher" suffisamment la clé secrète. Nous ferons une étude détaillée des techniques utilisées ainsi que des attaques possibles. Deuxièmement, nous proposons des techniques nouvelles permettant de contrecarrer ces attaques et étudions le coût de ces techniques en termes de taille et de performance de code. Une autre approche en cryptographie en boîte blanche est de concevoir des algorithmes dont on peut prouver la résistance à l’extraction de clé. Cette nouvelle approche implique de proposer des notions de sécurité adaptées au modèle boîte blanche. En particulier, le problème principal est de garantir que l’implémentation ne puisse être copiée et exécutée dans un autre environnement. Cette attaque appelée "code lifting" (copie de code) est équivalent à extraire la clé secrète. Une solution proposée dans la littérature est d’augmenter la taille du code afin d’augmenter la complexité en espace de l’attaque. Nous proposons une solution à ce problème en définissant un schéma de chiffrement que l’on peut implémenter en boîte blanche et qui utilise un dispositif physique appelé Physically Unclonable Function (PUF). Une PUF désigne un dispositif physique présentant des caractéristiques uniques et inclonables permettant de l’identifier. Ainsi, une PUF peut être vue comme l’empreinte (au sens biométrique) d’un appareil. Ce dispositif sera utilisé dans notre schéma comme moyen d’identifier l’environnement d’exécution d’un algorithme cryptographique et permettra de générer une clé spécifique à un appareil donné.
- Published
- 2020
92. Conception de schémas de chiffrement boîte blanche pour la sécurité des applications mobiles
- Author
-
Rasoamiaramanana, Sandra, Cryptology, arithmetic : algebraic methods for better algorithms (CARAMBA), Department of Algorithms, Computation, Image and Geometry (LORIA - ALGO), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria), Université de Lorraine, Marine Minier, Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Algorithms, Computation, Image and Geometry (LORIA - ALGO), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), and Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Cryptographie boîte blanche ,Obfuscation ,Traitor tracing ,White Box Cryptographie ,Traçage de traîtres ,PUF - Abstract
Today mobile devices are an integral part of our lives with the development of applications. In addition to smart phones, which are increasingly powerful, other devices such as connected objects may have to handle data that must remain secret. For example, the authentication of a connected object in a network requires the existence of a ``secret" held by the object. In the case of mobile applications, the emergence of payment applications allowing contactless payment from the telephone or banking applications poses serious security challenges. The need to secure applications is therefore essential both for users wishing to access a service without risking their goods and for service providers who have a financial interest in it. Thus, cryptography is used to protect these various mobile applications. In this context, we wish to meet this need with both a software and hardware approach to secure cryptography on open and exposed platforms. The aim of this thesis is to verify the security of software implementations of cryptographic algorithms in the white-box model and to propose techniques to reinforce this security in a mobile environment. The white-box model or white-box attacks context is opposed to the traditional black-box model and refers to a context in which an attacker controls an execution environment and has access to software implementations of cryptographic algorithms. Once a secret key is revealed, the security of the encryption scheme is no longer valid. In this context, the last line of defense is the implementation itself: the secret key is hidden in the code so that it cannot be distinguished or extracted. Many studies have been conducted on White-Box Cryptography and have led to proposals for white-box implementations of standardized algorithms such as the DES (Data Encryption Standard) or the AES (Advanced Encryption Standard). These algorithms are of particular interest due to their wide deployment. Unfortunately these proposals have revealed vulnerabilities and do not guarantee the confidentiality of the secret key. In this thesis, we are first interested in the reasons why not all proposed implementations allow to ``hide'' the secret key sufficiently. We will make a detailed study of the techniques used as well as the possible attacks. Secondly, we propose new techniques to counter these attacks and study the cost of these techniques in terms of code size and performance. Another approach in White-Box Cryptography is to design algorithms that can be proved to be resistant to key extraction. This new approach involves proposing security notions adapted to the white-box model. In particular, the main problem is to ensure that the implementation of the cryptographic algorithm cannot be copied and executed in another environment. This attack called "code lifting" (code copying) is equivalent to extracting the secret key. One solution proposed in the literature is to increase the size of the code in order to increase the space complexity of the attack. We propose a solution to this problem by defining an encryption scheme that can be implemented in a white-box and that uses a physical device called Physically Unclonable Function (PUF). A PUF refers to a physical device with unique and unclonable characteristics that can be used to identify it. Thus, a PUF can be seen as the fingerprint (in the biometric sense) of a device. The PUF will be used in our scheme as a means of identifying the execution environment of a cryptographic algorithm and will generate a key specific to a given device.; Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des applications. En plus des téléphones intelligents, d'autres équipements comme les objets connectés peuvent avoir à manipuler des données qui doivent rester secrètes. Par exemple, l'authentification d'un objet connecté dans un réseau nécessite l'existence d'un "secret" détenu par l'objet. Dans le cas des applications mobiles, l'apparition des applications de paiement permettant un paiement sans contact à partir du téléphone ou encore les applications bancaires pose de sérieux enjeux de sécurité. Le besoin de sécurisation des applications est ainsi primordial à la fois pour un utilisateur désireux d'accéder à un service sans risquer ses biens mais aussi pour les fournisseurs de services qui y ont un intérêt financier. Ainsi, la cryptographie est utilisée pour protéger ces diverses applications mobiles. Dans ce contexte, on souhaite répondre à ce besoin avec une approche à la fois logicielle et matérielle pour sécuriser la cryptographie sur des plateformes ouvertes et exposées. Le but de cette thèse est de vérifier la sécurité des implémentations logicielles d’algorithmes cryptographiques dans le modèle boîte blanche et de proposer des techniques permettant de renforcer cette sécurité dans un environnement mobile. Le modèle boîte blanche s’oppose au modèle boîte noire traditionnel et décrit un contexte dans lequel un attaquant contrôle l'environnement d’exécution et a accès aux implémentations logicielles. Une fois qu'une clé secrète est révélée, la sécurité du schéma de chiffrement n’est plus valable. Dans ce contexte, la dernière ligne de défense est l’implémentation elle-même : la clé secrète est cachée dans le code de manière à ce qu’elle ne puisse être ni identifiée, ni extraite. De nombreuses études ont été menées sur la cryptographie en boîte blanche et ont abouti à des propositions d’implémentations d’algorithmes standardisés tels que le DES (Data Encryption Standard) ou l’AES (Advanced Encryption Standard). Ces algorithmes intéressent particulièrement du fait de leur large déploiement. Malheureusement ces propositions ont révélé des vulnérabilités et ne garantissent pas la confidentialité de la clé secrète. Dans cette thèse, nous nous intéressons premièrement aux raisons pour lesquelles toutes les propositions d’implémentations ne permettent pas de "cacher" suffisamment la clé secrète. Nous ferons une étude détaillée des techniques utilisées ainsi que des attaques possibles. Deuxièmement, nous proposons des techniques nouvelles permettant de contrecarrer ces attaques et étudions le coût de ces techniques en termes de taille et de performance de code. Une autre approche en cryptographie en boîte blanche est de concevoir des algorithmes dont on peut prouver la résistance à l’extraction de clé. Cette nouvelle approche implique de proposer des notions de sécurité adaptées au modèle boîte blanche. En particulier, le problème principal est de garantir que l’implémentation ne puisse être copiée et exécutée dans un autre environnement. Cette attaque appelée "code lifting" (copie de code) est équivalent à extraire la clé secrète. Une solution proposée dans la littérature est d’augmenter la taille du code afin d’augmenter la complexité en espace de l’attaque. Nous proposons une solution à ce problème en définissant un schéma de chiffrement que l’on peut implémenter en boîte blanche et qui utilise un dispositif physique appelé Physically Unclonable Function (PUF). Une PUF désigne un dispositif physique présentant des caractéristiques uniques et inclonables permettant de l’identifier. Ainsi, une PUF peut être vue comme l’empreinte (au sens biométrique) d’un appareil. Ce dispositif sera utilisé dans notre schéma comme moyen d’identifier l’environnement d’exécution d’un algorithme cryptographique et permettra de générer une clé spécifique à un appareil donné.
- Published
- 2020
93. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
- Author
-
Ruiqi Guo, Dijiang Huang, Yan Zhu, and Guohua Gan
- Subjects
021110 strategic, defence & security studies ,Revocation ,Computer Networks and Communications ,Computer science ,business.industry ,0211 other engineering and technologies ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,Computer Science Applications ,Public-key cryptography ,Hardware and Architecture ,Traitor tracing ,0202 electrical engineering, electronic engineering, information engineering ,Role-based access control ,Key (cryptography) ,Cryptosystem ,020201 artificial intelligence & image processing ,business ,computer ,Software ,Information Systems - Abstract
Recently, many enterprises have moved their data into the cloud by using file syncing and sharing (FSS) services, which have been deployed for mobile users. However, Bring-Your-Own-Device (BYOD) solutions for increasingly deployed mobile devices have also in fact raised a new challenge for how to prevent users from abusing the FSS service. In this paper, we address this issue by using a new system model involving anomaly detection, tracing, and revocation approaches. The presented solution applies a new threshold public key based cryptosystem, called partially-ordered hierarchical encryption (PHE), which implements a partial-order key hierarchy and it is similar to role hierarchy widely used in RBAC. PHE provides two main security mechanisms, i.e., traitor tracing and key revocation, which can greatly improve the efficiency compared to previous approaches. The security and performance analysis shows that PHE is a provably secure threshold encryption and provides following salient management and performance benefits: it can promise to efficiently trace all possible traitor coalitions and support public revocation not only for the users but for the specified groups.
- Published
- 2018
- Full Text
- View/download PDF
94. An Improved Encryption Scheme for Traitor Tracing from Lattice
- Author
-
Qing Ye, Panke Qin, Guangxuan Chen, and Mingxing Hu
- Subjects
Computer science ,business.industry ,0102 computer and information sciences ,02 engineering and technology ,Encryption ,Topology ,01 natural sciences ,010201 computation theory & mathematics ,Traitor tracing ,Lattice (order) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Software - Abstract
This article first describes a paper by Ling, Phan, and Stehle at the CRYPTO 2014 which presented the first encryption scheme for traitor tracing from lattice, and the scheme is almost as efficient as the learning with errors (LWE) encryption. However, their scheme is not constructed on an efficient trapdoor, that is, the trapdoor generation and preimage sampling algorithms are rather complex and not suitable for practice. This article is considered to use the MP12 trapdoor to construct an improved traitor tracing scheme. First, by using batch execution method, this article proposes an improved extracting algorithm for the user's key. Then, this article combines that with multi-bit encryption system to construct an efficient one-to-many encryption scheme. Furthermore, it is presented that a novel projective sampling family has very small hidden constants. Finally, a comparative analysis shows that the parameters of the scheme such as lattice dimension, trapdoor size, and ciphertext expansion rate, etc., all decrease in some degree, and the computational cost is reduced.
- Published
- 2018
- Full Text
- View/download PDF
95. White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively
- Author
-
Xiaolei Dong, Jianting Ning, Lifei Wei, and Zhenfu Cao
- Subjects
Cloud computing security ,Computer science ,business.industry ,Client-side encryption ,020206 networking & telecommunications ,Cloud computing ,Access control ,02 engineering and technology ,computer.software_genre ,Computer security ,Traitor tracing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Attribute-based encryption ,Electrical and Electronic Engineering ,On-the-fly encryption ,business ,Cloud storage ,computer - Abstract
Ciphertext-policy attribute-based encryption (CP-ABE) has been proposed to enable fine-grained access control on encrypted data for cloud storage service. In the context of CP-ABE, since the decryption privilege is shared by multiple users who have the same attributes, it is difficult to identify the original key owner when given an exposed key. This leaves the malicious cloud users a chance to leak their access credentials to outsourced data in clouds for profits without the risk of being caught, which severely damages data security. To address this problem, we add the property of traceability to the conventional CP-ABE. To catch people leaking their access credentials to outsourced data in clouds for profits effectively, in this paper, we first propose two kinds of non-interactive commitments for traitor tracing. Then we present a fully secure traceable CP-ABE system for cloud storage service from the proposed commitment. Our proposed commitments for traitor tracing may be of independent interest, as they are both pairing-friendly and homomorphic. We also provide extensive experimental results to confirm the feasibility and efficiency of the proposed solution.
- Published
- 2018
- Full Text
- View/download PDF
96. Black-Box Trace&Revoke Codes.
- Author
-
Ngo, Hung, Phan, Duong, and Pointcheval, David
- Subjects
- *
CODING theory , *DATA encryption , *GROUP testing , *PROBABILITY theory , *COMPUTER users , *DECODERS & decoding - Abstract
We address the problem of designing an efficient broadcast encryption scheme which is also capable of tracing traitors. We introduce a code framework to formalize the problem. Then, we give a probabilistic construction of a code which supports both traceability and revocation. Given N users with at most r revoked users and at most t traitors, our code construction gives rise to a Trace&Revoke system with private keys of size O(( r+ t)log N) (which can also be reduced to constant size based on an additional computational assumption), ciphertexts of size O(( r+ t)log N), and O(1) decryption time. Our scheme can deal with certain classes of pirate decoders, which we believe are sufficiently powerful to capture practical pirate strategies. In particular, our code construction is based on a combinatorial object called ( r, s)-disjunct matrix, which is designed to capture both the classic traceability notion of disjunct matrix and the new requirement of revocation capability. We then probabilistically construct ( r, s)-disjunct matrices which help design efficient Black-Box Trace&Revoke systems. For dealing with 'smart' pirates, we introduce a tracing technique called 'shadow group testing' that uses (close to) legitimate broadcast signals for tracing. Along the way, we also proved several bounds on the number of queries needed for black-box tracing under different assumptions about the pirate's strategies. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
97. Dynamic Tardos Traitor Tracing Schemes.
- Author
-
Laarhoven, Thijs, Doumen, Jeroen, Roelse, Peter, Skoric, Boris, and de Weger, Benne
- Subjects
- *
BROADCASTING industry , *DIGITAL watermarking , *PIRATES , *QUADRATIC equations , *LOGARITHMS , *PROBABILITY theory , *FEEDBACK control systems - Abstract
We construct binary dynamic traitor tracing schemes, where the number of watermark bits needed to trace and disconnect any coalition of pirates is quadratic in the number of pirates, and logarithmic in the total number of users and the error probability. Our results improve upon results of Tassa, and our schemes have several other advantages, such as being able to generate all codewords in advance, a simple accusation method, and flexibility when the feedback from the pirate network is delayed. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
98. Security analysis of two traitor tracing schemes.
- Author
-
WANG Qing-long and XU Li
- Abstract
ZHANG Xue-jun et al presented a multi-oriented traitor tracing scheme with fully collusion resistance. They asserted that it was computationally infeasible for any number of users to get a different key by collusion. Here, this scheme was cryptographically analyzed. We found that it does not meet the collusion resistance. Also, we proposed a concrete attack in which the three or more traitors can build more than one valid decrypt key unidentified by black box tracing method. MA Hua et al also proposed a traitor tracing scheme that can trace all traitors undoubtedly. However, we presented a simple attack in which traitors can easily avoid tracing by changing their keys. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
99. Toward tracing and revoking schemes secure against collusion and any form of secret information leakage.
- Author
-
D'Arco, Paolo and Perez del Pozo, Angel
- Subjects
- *
GROUP signatures (Computer security) , *DIGITAL signatures , *DECODERS (Electronics) , *CONJOINT analysis , *AUTHENTICATION (Law) - Abstract
Tracing and revoking schemes enable a center to deliver protected content to a subset of privileged users of a given universe. The main property these schemes enjoy is that traitors, who illegally help unauthorized users to set up a pirate decoder for gaining access to the protected content, can be identified and removed from the privileged subset. Historically, traitors have been modeled as users who privately share their secret information with unauthorized users. However, in the Pirates 2.0 attack model, traitors collaborate in public and partially share their secret information with a certified guarantee of anonymity. Several classes of tracing and revoking schemes, like tree-based tracing and revoking schemes and code-based tracing schemes, are subject to such a new threat. In this paper we propose methods to cope with the Pirates 2.0 attack. We focus our attention on the class of tree-based schemes. We start by discussing some simple techniques, which can partially help to deal with the attack, and point out their limits. Then, looking through the literature, we recover some ideas, which can be used to strengthen tracing and revoking schemes. We also analyze the trade-off which can be obtained by applying these ideas to the schemes. Finally, we describe new hybrid schemes, obtained by mixing previous constructions, which can be used to face up the Pirates 2.0 attack. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
100. Further analysis of pairing-based traitor tracing schemes for broadcast encryption.
- Author
-
Wu, Tsu-Yang and Tseng, Yuh-Min
- Subjects
DATA encryption ,CRYPTOGRAPHY ,BILINEAR forms ,CIPHERS ,BROADCAST data systems - Abstract
ABSTRACT Pairing-based public key systems have recently received much attention because bilinear property contributes to the designs of many cryptographic schemes. In 2002, Mitsunari et al. proposed the first pairing-based traitor tracing scheme with constant-size ciphertexts and private keys. However, their scheme has been shown to be insecure for providing traitor tracing functionality. Recently, many researches still try to propose efficient pairing-based traitor tracing schemes in terms of ciphertext and private key sizes. In this paper, we present a security claim for the design of pairing-based traitor tracing schemes. For a pairing-based traitor tracing scheme with constant-size ciphertexts and private keys, if the decryption key is obtained by some pairing operations in pairing-based public key systems, the scheme will suffer from a linear attack and cannot provide the traitor tracing functionality. Finally, we apply our security claim to attack a pairing-based traitor tracing scheme proposed by Yang et al. to demonstrate our result. Our security claim can offer a notice and direction for designing pairing-based traitor tracing schemes. Copyright © 2012 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.