Paper 2015/750
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
Ryo Nishimaki, Daniel Wichs, and Mark Zhandry
Abstract
In a traitor tracing scheme, each user is given a different decryption key. A content distributor can encrypt digital content using a public encryption key and each user in the system can decrypt it using her decryption key. Even if a coalition of users combines their decryption keys and constructs some ``pirate decoder'' that is capable of decrypting the content, there is a public tracing algorithm that is guaranteed to recover the identity of at least one of the users in the coalition given black-box access to such decoder.
In prior solutions, the users are indexed by numbers
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- Traitor tracing
- Contact author(s)
- mzhandry @ gmail com
- History
- 2015-10-16: last of 2 revisions
- 2015-07-30: received
- See all versions
- Short URL
- https://ia.cr/2015/750
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/750, author = {Ryo Nishimaki and Daniel Wichs and Mark Zhandry}, title = {Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/750}, year = {2015}, url = {https://eprint.iacr.org/2015/750} }