Barriers to Black-Box Constructions of Traitor Tracing Systems

被引:2
|
作者
Tang, Bo [1 ]
Zhang, Jiapeng [2 ]
机构
[1] Univ Oxford, Oxford, England
[2] Univ Calif San Diego, La Jolla, CA 92093 USA
来源
关键词
GENERATION;
D O I
10.1007/978-3-319-70500-2_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reducibility between different cryptographic primitives is a fundamental problem in modern cryptography. As one of the primitives, traitor tracing systems help content distributors recover the identities of users that collaborated in the pirate construction by tracing pirate decryption boxes. We present the first negative result on designing efficient traitor tracing systems via black-box constructions from symmetric cryptographic primitives, e.g. one-way functions. More specifically, we show that there is no secure traitor tracing scheme in the random oracle model, such that l(k) . l(c)(2) < <(Omega)over tilde>(n), where l(k) is the length of user key, l(c) is the length of ciphertext and n is the number of users, under the assumption that the scheme does not access the oracle to generate private user keys. To our best knowledge, all the existing cryptographic schemes (not limited to traitor tracing systems) via black-box constructions from oneway functions satisfy this assumption. Thus, our negative results indicate that most of the standard black-box reductions in cryptography cannot help construct a more efficient traitor tracing system. We prove our results by extending the connection between traitor tracing systems and differentially private database sanitizers to the setting with random oracle access. After that, we prove the lower bound for traitor tracing schemes by constructing a differentially private sanitizer that only queries the random oracle polynomially many times. In order to reduce the query complexity of the sanitizer, we prove a large deviation bound for decision forests, which might be of independent interest.
引用
收藏
页码:3 / 30
页数:28
相关论文
共 50 条
  • [1] A flexible-revocation scheme for efficient public-key black-box traitor tracing
    Matsushita, T
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (04) : 1055 - 1062
  • [2] ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications
    Tseng, Yi-Fan
    Tso, Raylin
    Sun, Shi-Sheng
    Liu, Zi-Yuan
    Chen, You-Qian
    2024 19TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS 2024, 2024, : 33 - 39
  • [3] BLACK-BOX CONSTRUCTIONS OF PROTOCOLS FOR SECURE COMPUTATION
    Haitner, Iftach
    Ishai, Yuval
    Kushilevitz, Eyal
    Lindell, Yehuda
    Petrank, Erez
    SIAM JOURNAL ON COMPUTING, 2011, 40 (02) : 225 - 266
  • [4] TRACING THE CHARACTERISTIC CURVE OF A QUADRATIC BLACK-BOX
    SUN, J
    NETWORKS, 1989, 19 (06) : 637 - 650
  • [5] BorderPatrol: Isolating Events for Black-box Tracing
    Koskinen, Eric
    Jannotti, John
    EUROSYS'08: PROCEEDINGS OF THE EUROSYS 2008 CONFERENCE, 2008, : 191 - 203
  • [6] White Box Traitor Tracing
    Zhandry, Mark
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT IV, 2021, 12828 : 303 - 333
  • [7] Efficiency Bounds for Adversary Constructions in Black-Box Reductions
    Buldas, Ahto
    Jurgenson, Aivo
    Niitsoo, Margus
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 264 - +
  • [8] PROCESS TRACING METHODS IN DECISION SUPPORT SYSTEMS RESEARCH - EXPLORING THE BLACK-BOX
    TODD, P
    BENBASAT, I
    MIS QUARTERLY, 1987, 11 (04) : 493 - 512
  • [9] Simple, Black-Box Constructions of Adaptively Secure Protocols
    Choi, Seung Geol
    Dachman-Soled, Dana
    Malkin, Tal
    Wee, Hoeteck
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 387 - +
  • [10] BLACK-BOX MULTIGRID FOR SYSTEMS
    DENDY, JE
    APPLIED MATHEMATICS AND COMPUTATION, 1986, 19 (1-4) : 57 - 74