Paper 2006/383

Traitor tracing scheme with constant ciphertext rate against powerful pirates

Thomas Sirvent

Abstract

Traitor tracing schemes are used to fight piracy when distributing securely some data to multiple authorized receivers: if some receivers collude and share their decryption keys to build some pirate decoder, a tracing procedure should be able to find at least one of these ``traitors'' from the pirate decoder. In this paper, we consider powerful pirate decoders, which may sometimes refuse to decrypt, or may try to detect when the tracing procedure is running. Most known traitor tracing schemes are not secure against this kind of pirate decoders: this is in particular the case of the schemes with constant ciphertext rate, which are the most efficient ones. We build then a new scheme, with constant ciphertext rate and security against powerful pirate decoders, using watermarking techniques. This scheme has the interesting feature that a receiver may decrypt the ciphertexts progressively, when it was not possible in previous schemes with constant ratio between ciphertext and plaintext.

Metadata
Available format(s)
PDF PS
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
traitor tracingwatermarking
Contact author(s)
thomas sirvent @ m4x org
History
2006-11-03: received
Short URL
https://ia.cr/2006/383
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2006/383,
      author = {Thomas Sirvent},
      title = {Traitor tracing scheme with constant ciphertext rate against powerful pirates},
      howpublished = {Cryptology ePrint Archive, Paper 2006/383},
      year = {2006},
      note = {\url{https://eprint.iacr.org/2006/383}},
      url = {https://eprint.iacr.org/2006/383}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.