Abstract
Stream cipher systems are used to protect intellectual property in pay-TV and a number of other applications. In some of these, it would be convenient if a single ciphertext could be broadcast, and subscribers given slightly different deciphering keys that had the effect of producing slightly different plaintexts. In this way, a subscriber who illegally resold material licensed to him could be traced. Previously, such tracing could be done using a one-time pad, or with complicated key management schemes. In this paper we show how to endow any stream cipher with this potentially useful property. We also present a simple traitor tracing scheme based on random coding with which it can be used.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
“Fast Attack on Certain Stream Ciphers≓, Electronics Letters vol 29 (22 July 93) pp 1322–1323
“Searching for the Optimum Correlation Attack≓, in ‘Fast Software Encryption’ (1994), Springer LNCS vol 1008 pp 137–143
“On Fibonacci Keystream Generators≓, RJ Anderson, in Fast Software Encryption (1994) Springer LNCS vol 1008 pp 346–352
“Tiger: A Fast New Hash Function≓, RJ Anderson, E Biham, in Fast Software Encryption (1996), Springer LNCS vol 1039 pp 89–97
RJ Anderson, MG Kuhn, “Tamper Resistance — A Cautionary Note≓, in Proceedings of the Second Usenix Electronic Commerce Workshop (Nov 1996) pp 1–21
“Tracing Traitors≓, B Chor, A Fiat, M Naor, in Advances in Cryptology — Crypto 94, Springer LNCS vol 839 pp 257–270
“On Key Storage in Secure Networks≓, M Dyer, T Fenner, A Frieze, A Thomason, in Journal of Cryptology v 8 no 4 (Autumn 95) pp 189–200
“Conditionally-perfect secrecy and a provably-secure randomized cipher≓, U Maurer, in Journal of Cryptology v 5. no 1 pp 53–66
“Asymmetric Fingerprinting≓, B Pfitzmann, M Schunter, in Advances in Cryptology — Eurocrypt 96, Springer LNCS vol 1070 pp 84–95
’Anonymous Fingerprinting’, B Pfitzmann, M Waidner, IBM Research Report RZ 2881 (#90829) 11/18/96, IBM Research Division, Zurich
A Shamir, comment made from the floor of the conference
“Fingerprinting≓, in Proceedings of the 1983 IEEE Symposium on Security and Privacy pp 18–22
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Anderson, R., Manifavas, C. (1997). Chameleon — A new kind of stream cipher. In: Biham, E. (eds) Fast Software Encryption. FSE 1997. Lecture Notes in Computer Science, vol 1267. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0052339
Download citation
DOI: https://doi.org/10.1007/BFb0052339
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63247-4
Online ISBN: 978-3-540-69243-0
eBook Packages: Springer Book Archive