Barriers to Black-Box Constructions of Traitor Tracing Systems

被引:2
|
作者
Tang, Bo [1 ]
Zhang, Jiapeng [2 ]
机构
[1] Univ Oxford, Oxford, England
[2] Univ Calif San Diego, La Jolla, CA 92093 USA
来源
关键词
GENERATION;
D O I
10.1007/978-3-319-70500-2_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reducibility between different cryptographic primitives is a fundamental problem in modern cryptography. As one of the primitives, traitor tracing systems help content distributors recover the identities of users that collaborated in the pirate construction by tracing pirate decryption boxes. We present the first negative result on designing efficient traitor tracing systems via black-box constructions from symmetric cryptographic primitives, e.g. one-way functions. More specifically, we show that there is no secure traitor tracing scheme in the random oracle model, such that l(k) . l(c)(2) < <(Omega)over tilde>(n), where l(k) is the length of user key, l(c) is the length of ciphertext and n is the number of users, under the assumption that the scheme does not access the oracle to generate private user keys. To our best knowledge, all the existing cryptographic schemes (not limited to traitor tracing systems) via black-box constructions from oneway functions satisfy this assumption. Thus, our negative results indicate that most of the standard black-box reductions in cryptography cannot help construct a more efficient traitor tracing system. We prove our results by extending the connection between traitor tracing systems and differentially private database sanitizers to the setting with random oracle access. After that, we prove the lower bound for traitor tracing schemes by constructing a differentially private sanitizer that only queries the random oracle polynomially many times. In order to reduce the query complexity of the sanitizer, we prove a large deviation bound for decision forests, which might be of independent interest.
引用
收藏
页码:3 / 30
页数:28
相关论文
共 50 条
  • [21] Black-Box Constructions of Composable Protocols without Set-Up
    Lin, Huijia
    Pass, Rafael
    ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 461 - 478
  • [22] Detailed Black-Box Monitoring of Distributed Systems
    Neves, Francisco
    Vilaca, Ricardo
    Pereira, Jose
    APPLIED COMPUTING REVIEW, 2021, 21 (01): : 24 - 36
  • [23] Safe Inputs Approximation for Black-Box Systems
    Xue, Bai
    Liu, Yang
    Ma, Lei
    Zhang, Xiyue
    Sun, Meng
    Xie, Xiaofei
    2019 24TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2019), 2019, : 180 - 189
  • [24] Fully collusion resistant black-box traitor revocable broadcast encryption with short private keys
    Furukawa, Jun
    Attrapadung, Nuttapong
    AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2007, 4596 : 496 - 508
  • [25] Hierarchical key assignment for black-box tracing with efficient ciphertext size
    Matsushita, Tatsuyuki
    Imai, Hideki
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 92 - +
  • [26] THE MATHEMATICAL WORLD IN THE BLACK-BOX - SIGNIFICANCE OF THE BLACK-BOX AS A MEDIUM OF MATHEMATIZING
    MAASS, J
    SCHLOGLMANN, W
    CYBERNETICS AND SYSTEMS, 1988, 19 (04) : 295 - 309
  • [27] Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs
    Liang, Xiao
    Pandey, Omkant
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT IV, 2021, 12828 : 34 - 64
  • [28] INSIDE THE BLACK-BOX
    HORGAN, J
    IEEE SPECTRUM, 1986, 23 (11) : 65 - 65
  • [29] BLACK-BOX BLUES
    SNYDER, EL
    DISCOVER, 1984, 5 (08): : 6 - 6
  • [30] INSIDE THE BLACK-BOX
    WILENSKY, GR
    SOCIETY, 1994, 32 (01) : 68 - 69