Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000.

Slides:



Advertisements
Similar presentations
Ulams Game and Universal Communications Using Feedback Ofer Shayevitz June 2006.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Segmented Hash: An Efficient Hash Table Implementation for High Performance Networking Subsystems Sailesh Kumar Patrick Crowley.
Digital Signatures and Hash Functions. Digital Signatures.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Traitor Tracing Papers Benny Chor, Amos Fiat and Moni Naor, Tracing Traitors (1994) Moni Naor and Benny Pinkas, Threshold Traitor Tracing (1998) Presented.
Broadcast Encryption and Traitor Tracing Jin Kim.
Fingerprinting and Broadcast Encryption Multimedia Security.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Homework #4 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.
Introduction to Modern Cryptography, Lecture ?, 2005 Broadcast Encryption, Traitor Tracing, Watermarking.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Encryption Methods By: Michael A. Scott
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
New Protocols for Remote File Synchronization Based on Erasure Codes Utku Irmak Svilen Mihaylov Torsten Suel Polytechnic University.
CS548 Advanced Information Security Presented by Gowun Jeong Mar. 9, 2010.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Optimistic Mixing for Exit-Polls Philippe Golle, Stanford Sheng Zhong, Yale Dan Boneh, Stanford Markus Jakobsson, RSA Labs Ari Juels, RSA Labs.
Fingerprinting & Broadcast Encryption for Content Protection.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Broadcast Encryption Amos Fiat & Moni Naor Presented.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Private Approximation of Search Problems Amos Beimel Paz Carmi Kobbi Nissim Enav Weinreb (Technion)
. CLASSES RP AND ZPP By: SARIKA PAMMI. CONTENTS:  INTRODUCTION  RP  FACTS ABOUT RP  MONTE CARLO ALGORITHM  CO-RP  ZPP  FACTS ABOUT ZPP  RELATION.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu, Yinlong Xu, Xiaozhao Wang, Cheng Zhan and Pei.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Communication and Computation on Arrays with Reconfigurable Optical Buses Yi Pan, Ph.D. IEEE Computer Society Distinguished Visitors Program Speaker Department.
Multicast Security: A Taxonomy and Some Efficient Constructions By Cannetti et al, appeared in INFOCOMM 99. Presenter: Ankur Gupta.
Packet-Marking Scheme for DDoS Attack Prevention
Improving Loss Resilience with Multi- Radio Diversity in Wireless Networks by Allen Miu, Hari Balakrishnan and C.E. Koksal Appeared in ACM MOBICOM 2005,
Information Integrity and Message Digests CSCI 5857: Encoding and Encryption.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
1 Traitor Tracing. 2 Outline  Introduction  State of the art  Traceability scheme  Frameproof code  c-secure code  Combinatorial properties  Tracing.
Computer Science Revocation and Tracing Schemes for Stateless Receivers Dalit Naor, Moni Naor, Jeff Lotspiech Presented by Attila Altay Yavuz CSC 774 In-Class.
Fingerprinting Text in Logical Markup Languages Christian D. Jensen G.I. Davida and Y. Frankel (Eds.): Proc. Information Security Conference 2001, Lecture.
Key Management Network Systems Security Mort Anvari.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Jonathan Katz University of Maryland Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/08/08 CRYP-108 Aggregate Message- Authentication.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Security of Broadcast Networks 1. Overview r Broadcast networks are used mostly for TV r Historical development r Commercial models r One-way or Two-way.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
8.1 Determine whether the following statements are correct or not
Packet Leashes: Defense Against Wormhole Attacks
Risky Traitor Tracing and New Differential Privacy Negative Results
Broadcast Encryption Amos Fiat & Moni Naor Advances in Cryptography - CRYPTO ’93 Proceeding, LNCS, Vol. 773, 1994, pp Multimedia Security.
RS – Reed Solomon List Decoding.
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer
CS 6290 Many-core & Interconnect
Contention Resolution with Jobs of Heterogeneous Sizes
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000

The Situation Mass distribution or broadcast of content Limited set of authorized users Threat of unauthorized users Source

The Problems Cleartext leak Key leak Broadcast on a pirate network

The Goal Trace the source of piracy (the traitor) Prevent it and those relying on it from further access to the content Supply legal evidence of the traitor’s identity and take legal measures Do not harm or inconvenience legitimate users

The Idea Encrypt or modify the content in a different way for each authorized user (a variant) Figure out which variant the leaked or pirated content is Prosecute the traitor who received that variant

Obvious Solutions Have Obvious Problems Comparison of variants can reveal watermark Translation to cleartext creates leak opportunity Too much storage / transmission overhead ··· ··· ··· ···

Important Papers Chor, Fiat, Naor ’94 (key leak) Fiat & Tassa ’99 (cleartext rebroadcast) Boneh & Shaw ’95 (watermarking)

CFN ’94, Basic Idea Divide content into blocks and encrypt each block Create a set of keys that can be used to decrypt each block Map each user to a set of keys for each block (personal key) Personal key Decryption key Content Encrypted content

CFN ’94, Properties Content replication is “minimal” Pirate decoder capture reveals the keys it uses Users require keys for each block Traitors can be identified based on map from users to personal keys

CFN ’94, Issues Analysis is probabilistic –Chance of false incrimination is negligible, not zero Requires an upper bound on the size of a colluding group of traitors –This bound, and the number of users, should be set initially –Can guarantee finding one traitor

CFN ’94 Schemes Open scheme: algorithm is public but keys are secret Closed scheme: algorithm and keys are secret User/decryption scheme: part of algorithm that deals with distribution to authorized users Tracing algorithm: invoked when a pirate decoder is captured

An Open Scheme Choose l hash functions {h i } : {1, …, n}  S i = {s i1, …, s i 2k 2 } where |S i |= 2k 2. These are keys for block i. Each user u gets a personal key {h 1 (u), h 2 (u), …, h l (u)}. Let the decryption key d be the XOR of l keys d 1, …, d l. Encrypt each d i with each key in S i.

An Open Scheme Each user has one key from each S i so they can decrypt each d i and get d. k traitors can choose one key from each S i to form F for the decoder. When F is captured, for each i, mark all the users in the set h i -1 (f i ) where f i  S i  F. Most marks = traitor.

A Secret Scheme Mostly same as the open scheme Assign each user a secret “name” Choose random hash functions {h i } that map from names to sets S i, but |S i | = 4k, not 2k 2. The hash functions are secret. The user still receives l keys.

Probability of False Incrimination Scheme can make mistakes Open scheme: O(k 2 log n) keys (l), requiring O(k 4 log n) encryptions. Secret scheme: O(k log(n/p)) keys, requiring O(k 2 log (n/p)) encryptions. p is a secret scheme parameter – (1-p) is the success probability for p of the sets of k colluding traitors

Fiat & Tassa ’99, Overview Attacks problem of a pirate network Considers difference between: –Dynamic watermarking problem: can see pirate network and get continual feedback about leaks to adjust next broadcast –Static watermarking problem: content is marked only once; tracing is done one piracy is found

Dynamic Watermarking Watermarking: produce different variants of the content for each user (in CFN ’94, the keys are the “watermark” portion) Detect which variant is leaked onto the pirate network Change variants to isolate the traitor and disconnect them during transmission

An Efficient Dynamic Scheme Start with I = {all users}, P = {I}. Repeat: –For each S  P, transmit a different variant. –From the pirate network, determine which variant was leaked. –If the variant was sent to I then split I in half, into L i and R i. Add these to P and set I empty.

An Efficient Dynamic Scheme If the variant was sent to some L i (or R i, but then switch L and R): –Add the users in R i to I –If L i is a singleton, we have a traitor! Disconnect the user immediately. –Otherwise split L i into two new halves L j and R j.

Performance Analysis p is the number of traitors we want to be able to capture The number of variants needed is at most 2p+1 The amount of time needed to disconnect the p traitors is at most p log n + p

Dynamic Scheme Issues We may still need to start with some bound on the number of traitors p, but this can be altered (unlike the static or CFN ’94 case) Limited by bandwidth, since variants of all the content must be sent multiple times

Watermarking Assumptions Similarity: All the variants must carry the same content without distortion, as far as the users can tell What happens if not? Robustness: With some set of variants, it is impossible to create some untraceable variant

The Static Case Before distribution, variants of the content are watermarked Determine the traitor by matching their variant to the pirate copy Use probabilistic algorithm – do deterministic algorithms use exponential resources?

Lower Bounds The pirate controls p traitors. There is a deterministic algorithm with the number of variants p + 1, but any algorithm using fewer variants cannot be deterministic. In the static case, there is a minimum number of blocks needed to capture a traitor with probability 1 – .

Open Problems Proofs for CFN traitor tracing are not constructive Deterministic watermarking algorithm of size p+1 with convergence time polynomial in p Probabilistic dynamic algorithms Must deterministic static schemes be exponential? Practical issues (CD-ROM copying, etc.)