Advertisement

Trade-Off Traitor Tracing

  • Kazuto Ogawa
  • Go Ohtake
  • Goichiro Hanaoka
  • Hideki Imai
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4859)

Abstract

There has been a wide ranging discussion on the contents copyright protection in digital contents distribution systems. Fiat and Tassa proposed the framework of dynamic traitor tracing. Their framework requires dynamic computation transactions according to the real-time responses of the pirate, and it presumes real-time observation of contents redistribution and therefore cannot be simply utilized in an application where such an assumption is not valid. In this paper, we propose a new scheme that not only provides the advantages of dynamic traitor tracing schemes but also overcomes their problems.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Berkman, O., Parnas, M., Sgall, J.: Efficient Dynamic Traitor Tracing. In: Proc. of ACM-SODA 2000, pp. 586–595 (2000)Google Scholar
  2. 2.
    Berkman, O., Parnas, M., Sgall, J.: Efficient Dynamic Traitor Tracing. SIAM Journal on Computing 30(6), 1802–1828 (2000) (full version of BPS 2000)Google Scholar
  3. 3.
    Blakley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting Long Forgiving Messages. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 180–189. Springer, Heidelberg (1986)Google Scholar
  4. 4.
    Boneh, D., Franklin, M.: An Efficient Public Key Traitor Tracing Scheme. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 338–353. Springer, Heidelberg (1999)Google Scholar
  5. 5.
    Boneh, D., Franklin, M.: An Efficient Public Key Traitor Tracing Scheme, full version of [4], http://crypto.stanford.edu/~dabo/pubs.html
  6. 6.
    Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 252–270. Springer, Heidelberg (1994)Google Scholar
  7. 7.
    Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing Traitors. IEEE Trans. on Information Theory 46(3), 893–910 (2000) (full version of [6])Google Scholar
  8. 8.
    Fiat, A., Tassa, T.: Dynamic Traitor Tracing. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 354–371. Springer, Heidelberg (1999)Google Scholar
  9. 9.
    Fiat, A., Tassa, T.: Dynamic Traitor Tracing. J. of Cryptology 14(3), 211–223 (2001) (full version of [8])Google Scholar
  10. 10.
    Kiayias, A., Yung, M.: Traitor Tracing with Constant Transmission Rate. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 450–465. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    Kurosawa, K., Desmedt, Y.: Optimum Traitor Tracing and Asymmetric Schemes. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 145–157. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  12. 12.
    Ogawa, K., Ohtake, G., Hanaoka, G., Imai, H.: Trade-off Traitor Tracing, full version of this paper, available from the first author via e-mailGoogle Scholar
  13. 13.
    Safavi-Naini, R., Wang, Y.: Sequential Traitor Tracing. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 316–332. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  14. 14.
    Safavi-Naini, R., Wang, Y.: Sequential Traitor Tracing. IEEE Trans. on Information Theory 49(5), 1319–1326 (2003) (full version of [13])Google Scholar
  15. 15.
    Wagner, N.: Fingerprinting. In: Proc. of IEEE Symposium on S&P 1983, pp. 18–22 (1983)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Kazuto Ogawa
    • 1
  • Go Ohtake
    • 1
  • Goichiro Hanaoka
    • 2
  • Hideki Imai
    • 2
  1. 1.Japan Broadcasting CorporationJapan
  2. 2.National Institute of Advanced Industrial Science and TechnologyJapan

Personalised recommendations