Abstract
There has been a wide ranging discussion on the contents copyright protection in digital contents distribution systems. Fiat and Tassa proposed the framework of dynamic traitor tracing. Their framework requires dynamic computation transactions according to the real-time responses of the pirate, and it presumes real-time observation of contents redistribution and therefore cannot be simply utilized in an application where such an assumption is not valid. In this paper, we propose a new scheme that not only provides the advantages of dynamic traitor tracing schemes but also overcomes their problems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Berkman, O., Parnas, M., Sgall, J.: Efficient Dynamic Traitor Tracing. In: Proc. of ACM-SODA 2000, pp. 586–595 (2000)
Berkman, O., Parnas, M., Sgall, J.: Efficient Dynamic Traitor Tracing. SIAM Journal on Computing 30(6), 1802–1828 (2000) (full version of BPS 2000)
Blakley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting Long Forgiving Messages. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 180–189. Springer, Heidelberg (1986)
Boneh, D., Franklin, M.: An Efficient Public Key Traitor Tracing Scheme. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 338–353. Springer, Heidelberg (1999)
Boneh, D., Franklin, M.: An Efficient Public Key Traitor Tracing Scheme, full version of [4], http://crypto.stanford.edu/~dabo/pubs.html
Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 252–270. Springer, Heidelberg (1994)
Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing Traitors. IEEE Trans. on Information Theory 46(3), 893–910 (2000) (full version of [6])
Fiat, A., Tassa, T.: Dynamic Traitor Tracing. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 354–371. Springer, Heidelberg (1999)
Fiat, A., Tassa, T.: Dynamic Traitor Tracing. J. of Cryptology 14(3), 211–223 (2001) (full version of [8])
Kiayias, A., Yung, M.: Traitor Tracing with Constant Transmission Rate. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 450–465. Springer, Heidelberg (2002)
Kurosawa, K., Desmedt, Y.: Optimum Traitor Tracing and Asymmetric Schemes. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 145–157. Springer, Heidelberg (1998)
Ogawa, K., Ohtake, G., Hanaoka, G., Imai, H.: Trade-off Traitor Tracing, full version of this paper, available from the first author via e-mail
Safavi-Naini, R., Wang, Y.: Sequential Traitor Tracing. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 316–332. Springer, Heidelberg (2000)
Safavi-Naini, R., Wang, Y.: Sequential Traitor Tracing. IEEE Trans. on Information Theory 49(5), 1319–1326 (2003) (full version of [13])
Wagner, N.: Fingerprinting. In: Proc. of IEEE Symposium on S&P 1983, pp. 18–22 (1983)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ogawa, K., Ohtake, G., Hanaoka, G., Imai, H. (2007). Trade-Off Traitor Tracing. In: Srinathan, K., Rangan, C.P., Yung, M. (eds) Progress in Cryptology – INDOCRYPT 2007. INDOCRYPT 2007. Lecture Notes in Computer Science, vol 4859. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77026-8_25
Download citation
DOI: https://doi.org/10.1007/978-3-540-77026-8_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77025-1
Online ISBN: 978-3-540-77026-8
eBook Packages: Computer ScienceComputer Science (R0)