Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Improving the boneh-franklin traitor tracing scheme
 
conference paper

Improving the boneh-franklin traitor tracing scheme

Junod, Pascal
•
Karlov, Alexandre  
•
Lenstra, Arjen K.  
2009
Lecture Notes in Computer Science
Public Key Cryptography - PKC 2009. Proceedings 12th International Conference on Practice and Theory in Public Key Cryptography

Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a static set of l legitimate users, then all traitors can be identified given the pirate key. In this paper we address three practicality and security issues of the Boneh-Franklin traitor- tracing scheme. In the first place, without changing the original scheme, we modify its tracing procedure in the non-black-box model such that it allows identification of k traitors in time O˜(k2), as opposed to the original tracing complexity O˜(l). This new tracing procedure works independently of the nature of the Reed-Solomon code used to watermark private keys. As a consequence, in applications with billions of users it takes just a few minutes on a common desktop computer to identify large collusions. Secondly, we exhibit the lack of practical value of list- decoding algorithms to identify more than k traitors. Finally, we show that 2k traitors can derive the keys of all legitimate users and we propose afixtothis security issue. © International Association for Cryptologic Research 2009.

  • Files
  • Details
  • Metrics
Type
conference paper
DOI
10.1007/978-3-642-00468-1_6
Author(s)
Junod, Pascal
Karlov, Alexandre  
Lenstra, Arjen K.  
Date Issued

2009

Publisher

Springer Verlag

Published in
Lecture Notes in Computer Science
Volume

5443

Subjects

Computer privacy

•

Decoding

•

Public key cryptography

•

Reed-Solomon codes

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LACAL  
Event nameEvent place
Public Key Cryptography - PKC 2009. Proceedings 12th International Conference on Practice and Theory in Public Key Cryptography

Irvine, CA, United states

Available on Infoscience
June 24, 2010
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/51036
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés