Cryptography Reference
In-Depth Information
f is the polynomial corresponding to the vector w, we will now provide an
e cient algorithm that on input ν it computes the polynomial f (and hence
the vector w).
Let g be a polynomial of degree at most `/2 such that g(i) = 0 for all
i = 1,...,n for which f(i) 6= ν i (where ν i is the i-th component of ν). Then
we know that for all i = 1,...,n we have f(i) · g(i) = g(i) ·ν i (in Z q ). The
polynomial fg has degree at most n − `/2 − 1. Hence, we get n equations
(for each i = 1,...,n) in n variables (the variables are the coe cients of the
polynomials fg and g; where the leading coe cient of g is 1.) Let h and g be
a solution where g is a non-zero polynomial: h is a polynomial of degree at
most n − `/2 − 1 and g is of degree at most `/2. We know that whenever
w i = ν i (i.e. at n−`/2 points i) we have h(i) = g(i)ν i = g(i)f(i). It follows
that f = h/g.
We are now ready to prove that ME BF ` is a non-black box traitor trac-
ing scheme, i.e., there exists a tracer that makes the corresponding tracing
game for `/2-coalitions winnable against any probabilistic polynomial time
adversary A.
Theorem 3.27. The Boneh-Franklin multiuser encryption scheme ME BF ` is
a non-black box traitor tracing scheme for 2 -coalitions with success probability
α against σ-pirate for any choice of σ,α that satisfies σ ≥ α.
Proof. We need to present a tracing party T that works for any adversary A
and allows the recovery of any traitor set S that is fed to A. Let u 1 ,...,u t
{1,...,N} be a set of rows S of B (that correspond to the keys of the traitors).
Based on Lemma 3.25 and the fact that A is polynomial-time we know that the
output of A on the keys of the traitors must be of the form η = P i=1 µ i δ u i ,
where µ 1 ,...,µ t ∈ Z q , assuming that t ≤ `−1.
By the definition of η it holds that there exists a vector ν = hν 1 ,...,ν n i
with ν u v = µ v for all v = 1,...,t and ν i = 0 for i 6∈ {u 1 ,...,u t }, with the
property hν 1 ,...,ν n i·B = η.
The tracing algorithm proceeds as follows: first it computes an arbitrary
vector ξ ∈ Z q that satisfies the system of equations ξ · B = η. Note that
such ξ can be found easily since ξ ·B = η is a system of ` equations with
n unknowns, n > `, and B contains a minor of size ` (due to the fact that
the matrix B is of full rank). It is easy to verify that the vector w = df ξ −ν
belongs to the linear code M: indeed, w·B = ξ ·B−ν ·B = η −η = 0. As
a result the vector ξ can be expressed as ξ = w + ν.
Provided that t ≤ 2 it holds that the Hamming weight of ν is less or equal
to `/2 and as a result ξ is a n-vector that differs in at most 2 positions from
the vector w that belongs in M. Due to the lemma 3.26 the linear code M
is e ciently decodable i.e., it holds that w can be recovered e ciently if we
feed ξ to the decoding procedure for M. The recovery of w, immediately will
result in the recovery of ν = ξ−w. The set S can be thus recovered e ciently
by observing the non-zero entries of ν.
Search WWH ::




Custom Search