Skip to main content

Trade-Off Traitor Tracing

  • Conference paper
Progress in Cryptology – INDOCRYPT 2007 (INDOCRYPT 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4859))

Included in the following conference series:

Abstract

There has been a wide ranging discussion on the contents copyright protection in digital contents distribution systems. Fiat and Tassa proposed the framework of dynamic traitor tracing. Their framework requires dynamic computation transactions according to the real-time responses of the pirate, and it presumes real-time observation of contents redistribution and therefore cannot be simply utilized in an application where such an assumption is not valid. In this paper, we propose a new scheme that not only provides the advantages of dynamic traitor tracing schemes but also overcomes their problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Berkman, O., Parnas, M., Sgall, J.: Efficient Dynamic Traitor Tracing. In: Proc. of ACM-SODA 2000, pp. 586–595 (2000)

    Google Scholar 

  2. Berkman, O., Parnas, M., Sgall, J.: Efficient Dynamic Traitor Tracing. SIAM Journal on Computing 30(6), 1802–1828 (2000) (full version of BPS 2000)

    Google Scholar 

  3. Blakley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting Long Forgiving Messages. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 180–189. Springer, Heidelberg (1986)

    Google Scholar 

  4. Boneh, D., Franklin, M.: An Efficient Public Key Traitor Tracing Scheme. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 338–353. Springer, Heidelberg (1999)

    Google Scholar 

  5. Boneh, D., Franklin, M.: An Efficient Public Key Traitor Tracing Scheme, full version of [4], http://crypto.stanford.edu/~dabo/pubs.html

  6. Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 252–270. Springer, Heidelberg (1994)

    Google Scholar 

  7. Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing Traitors. IEEE Trans. on Information Theory 46(3), 893–910 (2000) (full version of [6])

    Google Scholar 

  8. Fiat, A., Tassa, T.: Dynamic Traitor Tracing. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 354–371. Springer, Heidelberg (1999)

    Google Scholar 

  9. Fiat, A., Tassa, T.: Dynamic Traitor Tracing. J. of Cryptology 14(3), 211–223 (2001) (full version of [8])

    Google Scholar 

  10. Kiayias, A., Yung, M.: Traitor Tracing with Constant Transmission Rate. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 450–465. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  11. Kurosawa, K., Desmedt, Y.: Optimum Traitor Tracing and Asymmetric Schemes. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 145–157. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  12. Ogawa, K., Ohtake, G., Hanaoka, G., Imai, H.: Trade-off Traitor Tracing, full version of this paper, available from the first author via e-mail

    Google Scholar 

  13. Safavi-Naini, R., Wang, Y.: Sequential Traitor Tracing. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 316–332. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  14. Safavi-Naini, R., Wang, Y.: Sequential Traitor Tracing. IEEE Trans. on Information Theory 49(5), 1319–1326 (2003) (full version of [13])

    Google Scholar 

  15. Wagner, N.: Fingerprinting. In: Proc. of IEEE Symposium on S&P 1983, pp. 18–22 (1983)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

K. Srinathan C. Pandu Rangan Moti Yung

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ogawa, K., Ohtake, G., Hanaoka, G., Imai, H. (2007). Trade-Off Traitor Tracing. In: Srinathan, K., Rangan, C.P., Yung, M. (eds) Progress in Cryptology – INDOCRYPT 2007. INDOCRYPT 2007. Lecture Notes in Computer Science, vol 4859. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77026-8_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77026-8_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77025-1

  • Online ISBN: 978-3-540-77026-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics