Cryptography Reference
In-Depth Information
Consider the first traitor u that belongs to T∩users(v,v 0 ) and is selected
in line 3 of Figure 5.11 . We have that the number of boxes produced will equal
to l−1 + s−1 + A u , where l−1 is the number of nodes in the ⊥-path from
v to the junction for the u-path and s is the number of nodes in the u-path.
It is immediate that the height of the node u 0 as defined in the theorem's
statement based on u will be exactly l + s − 2; it follows that the number
of boxes contributed by traitor u will be height(top f (u 0 )) + A u . Based on the
way the makeboxes procedure works, the same exact argumentation applies
to theremaining traitors in T∩users(v,v 0 ).
This completes the argument on the number of boxes the MasterBox
of Figure 5.11 produces. We denote this number by K. We next prove by
induction on k that if Equation 5.1 holds, i.e. k < K, then we obtain:
Prob[B k+1 (Encrypt(ek,m,ψ k )) = m] ≥ σ
where B i ← MasterBox(1 t+log n ,i) and ψ k is the revocation instruction
produced by SDDisable(ψ,hB 1 ,B 2 ,···,B k ,σ).
(i) Base case with k = 0: as there is no pirate box other than B 1 we have
ψ 0 = ψ. Denote the first box produced by makeboxes(Steiner(T,v,v 0 ),f) as
B 1 where (v,v 0 ) is a pair of nodes such that users(v,v 0 ) ∈ ψ. Since the ⊥-path
of the Steiner tree starts with v and ends with v 0 , the box will be of the form
SDBox(v,v 0 ,u) for the traitor u whose traitor path is the shortest path hanging
off the ⊥-path. It is immediate that Prob[B 1 (Encrypt(ek,m,ψ 0 )) = m] ≥ σ.
(ii) Induction assumption for some 0 ≤ k < K −1: We assume that
Prob[B k (Encrypt(ek,m,ψ k−1 )) = m] ≥ σ
holds for ψ k−1 = SDDisable(ψ,hB 1 ,B 2 ,···,B k−1 ,σ).
(iii) Induction step: We have two cases; either the pirate decoders B k and
B k+1 are generated subsequently in the same batch of a call of makeboxes
on some Tree, or B k+1 is the first output of a new call while B k is the last
output of a previous call to makeboxes.
The first case: Suppose that B k and B k+1 are produced by the key of a
traitor u ∈ T whose traitor path is the shortest path hanging off the ⊥-path of
the Tree. Note that if the ⊥-path = hv 1 ,...,v m i for some m, then Tree would
be of the form Steiner(T,v 1 ,v m ).
Let us suppose that B k = SDBox(x 1 ,y 1 ,u) and B k+1 = SDBox(x 2 ,y 2 ,u)
for some nodes x 1 ,y 1 ,x 2 ,y 2 . The induction assumption along with the defin-
ition of SDBox yield the fact that users(x 1 ,y 1 ) ∈ ψ k−1 . Due to the evolution
strategy given in Figure 5.11 observe that the set users(x 2 ,y 2 ) is a subset of the
set users(x 1 ,y 1 ) and we have that users(x 2 ,y 2 ) ∈ SDDisable(ψ k−1 ,B k ,σ).
Next we observe that ψ k = SDDisable(ψ,hB 1 ,B 2 ,···,B k ,σ) is equal to
SDDisable(ψ k−1 ,B k ,σ) due to the way we define the successive revocation
over a sequence of pirate decoders. Hence we obtain users(x 2 ,y 2 ) ∈ ψ k . Recall
that B k+1 = SDBox(x 2 ,y 2 ,u), the definition of SDBox completes the final
argument:
Search WWH ::




Custom Search