Paper 2001/016
Efficient Traitor Tracing Algorithms using List Decoding
Alice Silverberg, Jessica Staddon, and Judy Walker
Abstract
We apply powerful, recently discovered techniques for the list decoding of error-correcting codes to the problem of efficiently tracing traitors. Traitor tracing schemes have been extensively studied for use as a piracy deterrent. In a widely studied model for protecting digital content, each user in the system is associated with a unique set of symbols. For example, the sets may be used to install a software CD or decrypt pay-TV content. The assignment of sets is done in such a way that if a bounded collection of sets is used to form a new set to enable piracy, at least one of the traitor sets can be identified by applying a traitor tracing algorithm to the newly formed set. Much work has focused on methods for constructing such traceability schemes, but the complexity of the traitor tracing algorithms has received little attention. A widely used traitor tracing algorithm, the TA algorithm, has a running time of
Metadata
- Available format(s)
- PS
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- traceabilitytraitor tracinglist decodingerror-correcting codes
- Contact author(s)
- silver @ math ohio-state edu
- History
- 2001-02-26: received
- Short URL
- https://ia.cr/2001/016
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2001/016, author = {Alice Silverberg and Jessica Staddon and Judy Walker}, title = {Efficient Traitor Tracing Algorithms using List Decoding}, howpublished = {Cryptology {ePrint} Archive, Paper 2001/016}, year = {2001}, url = {https://eprint.iacr.org/2001/016} }