Paper 2006/383
Traitor tracing scheme with constant ciphertext rate against powerful pirates
Thomas Sirvent
Abstract
Traitor tracing schemes are used to fight piracy when distributing securely some data to multiple authorized receivers: if some receivers collude and share their decryption keys to build some pirate decoder, a tracing procedure should be able to find at least one of these ``traitors'' from the pirate decoder. In this paper, we consider powerful pirate decoders, which may sometimes refuse to decrypt, or may try to detect when the tracing procedure is running. Most known traitor tracing schemes are not secure against this kind of pirate decoders: this is in particular the case of the schemes with constant ciphertext rate, which are the most efficient ones. We build then a new scheme, with constant ciphertext rate and security against powerful pirate decoders, using watermarking techniques. This scheme has the interesting feature that a receiver may decrypt the ciphertexts progressively, when it was not possible in previous schemes with constant ratio between ciphertext and plaintext.
Metadata
- Available format(s)
- PDF PS
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- traitor tracingwatermarking
- Contact author(s)
- thomas sirvent @ m4x org
- History
- 2006-11-03: received
- Short URL
- https://ia.cr/2006/383
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2006/383, author = {Thomas Sirvent}, title = {Traitor tracing scheme with constant ciphertext rate against powerful pirates}, howpublished = {Cryptology {ePrint} Archive, Paper 2006/383}, year = {2006}, url = {https://eprint.iacr.org/2006/383} }