Fully Secure Codes Based Tracing and Revoking Scheme with Constant Ciphertext Xingwen Zhao, Hui Li State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an 710071 School of Telecommunications Engineering, Xidian University, Xi’an 710071 Peoples R China Abstract In broadcast encryption system certain users may leak their decryption keys to build pirate decoders, so traitor tracing is quite necessary. There exist many codes based traitor tracing schemes. As pointed out by Billet and Phan in ICITS 2008, these schemes lack revocation ability. The ability of revocation can disable identified malicious users and users who fail to fulfill the payments, so that the broadcast encryption system can be more practi- cal. Recently, Zhao and Li presented a construction of codes based tracing and revoking scheme which achieves user revocation as well as traitor trac- ing. However, their scheme is only secure against chosen plaintext attacks under selective-adversary model with random oracle. In this paper, we ob- tain a new construction of codes based tracing and revoking scheme which is proved secure against chosen ciphertext attacks under adaptive-adversary model without random oracle. Our idea is to insert codeword into Boneh and Hamburg’s identity based broadcast encryption scheme to retain the ability of user revocation and use Boneh and Naor’s method to trace traitors. Our fully secure scheme is roughly as efficient as Zhao and Li’s scheme while the security is enhanced. Keywords: Broadcast encryption, traitor tracing, collusion secure codes, user revocation, copyright protection. Email address: sevenzhao@hotmail.com, lihui@mail.xidian.edu.cn (Xingwen Zhao, Hui Li) Preprint submitted to Journal of Systems and Software March 3, 2013