Randomized Traitor Tracing Algorithms for Broadcast Security
نویسندگان
چکیده
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is O(√T ) where T is the mean time taken by the brute force algorithm) and can catch traitors, i.e., dishonest users who collude by giving subsets of their key(s) to others. The system model we use can be applied to various broadcast scenarios, e.g., over the internet or in a PayTV system. We also prove a structure theorem for the “square” codes we design for traitor tracing.
منابع مشابه
Randomised Dynamic Traitor Tracing
Dynamic traitor tracing schemes are used to trace the source of piracy in broadcast environments such as cable TV. Dynamic schemes divide content into a series of watermarked segments that are then broadcast. The broadcast provider can adapt the watermarks according to the pirate’s response and eventually trace him/her. As dynamic algorithms are deterministic, for a given set of inputs, the tra...
متن کاملNew Secret Key Traitor Tracing Scheme with Dispute Settlement from Bilinear Maps
We propose a new secret key traitor tracing scheme using bilinear maps, in which the size of the enabling-block in a broadcast message is independent of the number of subscribers. The proposed traitor tracing scheme can identify malicious subscribers (also called traitors) from a pirate decoder, which is collusively made by k or fewer traitors. Further, any malicious subscriber cannot falsify a...
متن کاملTrials of Traced Traitors
Traitor tracing schemes as introduced by Chor, Fiat, and Naor at Crypto ’94 are intended for tracing people who abuse a broadcast encryption scheme by allowing additional, illegitimate users to decrypt the data. The schemes should also provide legal evidence for such treachery. We discuss and improve the quality of such evidence, i.e., the security of trials that would be held about supposedly ...
متن کاملAmendment to Trace and Revoke Systems with Short Ciphertexts
Traitor tracing is needed because some users in broadcast encryption system may give out their decryption keys to construct pirate decoders. Recently, Liu and Yuan described a trace and revoke systems with short ciphertexts. In this paper, we show that their scheme cannot achieve traitor tracing, since any receiver can decide whether the given ciphertext is well-formed or not so as to decide wh...
متن کاملCodes Based Tracing and Revoking Scheme with Constant Ciphertext
In broadcast encryption system certain users may leak their decryption keys to build pirate decoders, so traitor tracing is quite necessary. There exist many codes based traitor tracing schemes. As pointed out by Billet and Phan in ICITS 2008, these schemes lack revocation ability. The ability of revocation can disable identified malicious users and users who fail to fulfill the payments, so th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003