Efficient Traitor Tracing Algorithms Using List Decoding
نویسندگان
چکیده
We apply powerful, recently discovered techniques for the list decoding of error-correcting codes to the problem of efficiently tracing traitors. Much work has focused on methods for constructing such traceability schemes, but the complexity of the traitor tracing algorithms has received little attention. A widely used traitor tracing algorithm, the TA algorithm, has a runtime of O(N) in general, where N is the number of sets in the system (e.g., the number of copies of a software CD, or the number of smartcards for decrypting pay-TV), and therefore is inefficient for large populations. In this paper we use a coding theoretic approach to produce traceability schemes for which the TA algorithm is very fast. The IPP algorithm is another traitor tracing algorithm that has garnered attention recently. It is less efficient than the TA algorithm, but has the interesting feature that it accumulates important additional piracy information, namely, a list of all coalitions capable of constructing a given pirate. We give evidence that when a natural algebraic structure is used to construct traceability schemes, the ability to trace with the IPP algorithm implies the ability to trace with the TA algorithm. Thus if the goal is to find a traitor, it is unlikely that IPP codes offer efficiency advantages. In addition, we show that the error-correcting code approach can be used to construct traceability schemes with an algorithm that finds all possible traitor coalitions faster than the brute force approach of the IPP algorithm. Both of these results address open issues raised in [37]. Finally, we suggest the use of other decoding techniques to trace traitors when additional information about the behavior of the traitors is known.
منابع مشابه
Applications of list decoding to tracing traitors
We apply results from algebraic coding theory to solve problems in cryptography, by using recent results on list decoding of error-correcting codes to efficiently find traitors who collude to create pirates. We produce schemes for which the TA (traceability) traitor tracing algorithm is very fast. We compare the TA and IPP (identifiable parent property) traitor tracing algorithms, and give evid...
متن کاملAn Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor tracing scheme based on cover-free families. The new traitor tracing scheme is similar to the Boneh-Franklin scheme except that in the BonehFranklin scheme, decryption keys are derived from Reed-Solomon codes while in o...
متن کاملEfficient Forensic Analysis for Anonymous Attack in Secure Content Distribution
This article discusses a forensic technology that is used to defend against piracy for secure multimedia content distribution. In particular we are interested in anonymous rebroadcasting type of attack where the attackers redistribute the per-content encrypting key or decrypted plain content. Traitor tracing technology can be used to defend against this attack by identifying the original users ...
متن کاملRisky Traitor Tracing and New Differential Privacy Negative Results
In this work we seek to construct collusion-resistant traitor tracing systems with small ciphertexts from standard assumptions that also move toward practical efficiency. In our approach we will hold steadfast to the principle of collusion resistance, but relax the requirement on catching a traitor from a successful decoding algorithm. We define a f -risky traitor tracing system as one where th...
متن کاملFast detection of Tardos codes with Boneh-Shaw types
This paper presents a traitor tracing method dedicated to video content distribution. It is based on a two-level approach with probabilistic traitor tracing codes. Codes are concatenated and decoded successively, the first one is used to decrease the decoding complexity and the second to accuse users. We use the well-known Tardos fingerprinting code for the accusation process and a Boneh-Shaw c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2001 شماره
صفحات -
تاریخ انتشار 2001