期刊文献+

A Multi-Key Pirate Decoder Against Traitor Tracing Schemes

A Multi-Key Pirate Decoder Against Traitor Tracing Schemes
原文传递
导出
摘要 In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protection functionalities and is capable of defeating most multiple-round based traitor tracing schemes such as the schemes based on the black-box confirmation method. In particular, the proposed pirate decoder is customized to defeat the private key and the public key fully collusion resistant traitor tracing (FTT) schemes, respectively. We show how the decoder prolongs a trace process so that the tracer has to give up his effort. FTT schemes are designed to identify all the traitors. We show that decoder enables the FTT schemes to identify at most 1 traitors. Finally, assuming the decoder is embedded with several bytes of memory, we demonstrate how the decoder is able to frame innocent users at will. In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protection functionalities and is capable of defeating most multiple-round based traitor tracing schemes such as the schemes based on the black-box confirmation method. In particular, the proposed pirate decoder is customized to defeat the private key and the public key fully collusion resistant traitor tracing (FTT) schemes, respectively. We show how the decoder prolongs a trace process so that the tracer has to give up his effort. FTT schemes are designed to identify all the traitors. We show that decoder enables the FTT schemes to identify at most 1 traitors. Finally, assuming the decoder is embedded with several bytes of memory, we demonstrate how the decoder is able to frame innocent users at will.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第2期362-374,共13页 计算机科学技术学报(英文版)
关键词 broadcast encryption multi-key pirate decoder traitor tracing broadcast encryption, multi-key pirate decoder, traitor tracing
  • 相关文献

参考文献33

  • 1Kiayias A, Yung M. On crafty pirates and foxy tracers. In ACM Workshop in Digital Rights Management (DRM 2001), Philadelphia, USA, Nov. 5, 2002, Revised Papers, LNCS2320, pp.22-39.
  • 2Kiayias A, Yung M. Self protecting pirates and black-box traitor tracing. In Proc. CRYPTO 2001, Santa Barbara, USA, Aug. 19-23, 2001, pp.63-79.
  • 3Pfitzmann B. Trails of traced traitors. In Information Hiding Workshop, Cambridge, UK, May 30-June 1, 1996, LNCS 1174, pp.49-64.
  • 4Yan J J, Wu Y. An attack on a traitor tracing scheme. Technical Report No.518, Computer Lab., Univ. Cambridge, 2001.
  • 5Boneh D, Franklin M. An efficient public key traitor tracing scheme. In Proc. Crypto 1999, Santa Barbara, USA, Aug. 15- 19, 1999, LNCS 1666, pp.338-353.
  • 6Kiayias A, Yung M. Traitor tracing with constant transmission rate. In Proc. Eurocrypt 2002, Amsterdam, The Netherlands, April 28-May2, 2002, LNCS 2332, pp.450-465.
  • 7Chabanne H, Phan D H, Pointcheval D. Public traceability in traitor tracing schemes. In Proc. EUROCRYPT 2005, Aarhus, Denmark, May 22-26, 2005, LNCS 3494, pp.542-558.
  • 8Dwork C, Lotspiech J, Naor M. Digital signets: Self-enforcing protection of digital content. In Proc. STOC 1996, Philadelphia, USA, May 22-24, 1996, pp.489-498.
  • 9Naor M, Pinkas B. Efficient trace and revoke schemes. In Proc. Financial Crypto 2000, Anguilla, British West Indies, Feb. 20-24, 2000, LNCS 1962, pp.1-20.
  • 10Fiat A, Tassa T. Dynamic traitor tracing. In Proc. CRYPT01999, Santa, Barbara, USA, Aug. 15-19, 1999, LNCS 1666, pp.354-371.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部