Abstract
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Tassa proposed dynamic traitor tracing schemes that can detect all traitors if they attempt to re-broadcast the content after it is decrypted. In their scheme the content is broken into segments and marked so that a re-broadcasted segment can be linked to a particular subgroup of users. Mark allocation for a segment is determined when the re-broadcast from the previous segment is observed. They showed that by careful design of the mark allocation scheme it is possible to detect all traitors.
We consider the same scenario as Fiat and Tassa and propose a new type of traceability scheme, called sequential traitor tracing, that can efficiently detect all traitors and does not require any real-time computation. That is, the marking allocation is pre-determined and is independent of the re-broadcasted segment. This is very attractive as it allows segments to be shortened and hence the overall convergence time reduced. We analyse the scheme and give two general constructions one based on a special type of function family, and the other on error correcting codes. We obtain the convergence time of these schemes and show that the scheme based on error correcting codes has a convergence time which is the same as the best known result for dynamic schemes.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
O. Berkman, M. Parnas, and J. Sgall. Efficient dynamic traitor tracing. to appear at SODA 2000, 2000.
D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. In Advances in Cryptology-CRYPTO’95, Lecture Notes in Computer Science, volume 963, pages 453–465. Springer-Verlag, Berlin, Heidelberg, New York, 1995.
D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, Vol. 44 No. 5:1897–1905, 1998.
B. Chor, A. Fiat, and M. Naor. Tracing traitors. In Advances in Cryptology-CRYPTO’94, Lecture Notes in Computer Science, volume 839, pages 257–270. Springer-Verlag, Berlin, Heidelberg, New York, 1994.
I. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing, Vol. 6 no. 12:1673–1687, 1997.
A. Fiat and M. Naor. Broadcast encryption. In Advances in Cryptology-CRYPTO’93, Lecture Notes in Computer Science, volume 773, pages 480–491. Springer-Verlag, Berlin, Heidelberg, New York, 1994.
A. Fiat and T. Tassa. Dynamic traitor tracing. In Advances in Cryptology-CRYPTO’99, Lecture Notes in Computer Science, volume 1666, pages 354–371. Springer-Verlag, Berlin, Heidelberg, New York, 1999.
E. Gafni, J. Staddon, and Y.L. Yin. Efficient methods for intergrating traceability and broadcast encryption. In Advances in Cryptology-CRYPTO’99, Lecture Notes in Computer Science, volume 1666, pages 372–387. Springer-Verlag, Berlin, Heidelberg, New York, 1999.
D. Stinson and R. Wei. Combinatorial properties and constructions of traceability schemes and framproof codes. SIAM Journal on Discrete Mathematics, 11:41–53, 1998.
D. R. Stinson and R. Wei. Key preassigned traceability schemes for broadcast encryption. In Proceedings of SAC’98, Lecture Notes in Computer Science, volume 1556, pages 144–156. Springer-Verlag, Berlin, Heidelberg, New York, 1999.
M. Swanson, M. Kobayashi, and A. Tewfik. Multimedia data-embedding and watermarking technologies. Proceedings of IEEE, Vol. 86 no. 6:1064–1087, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Safavi-Naini, R., Wang, Y. (2000). Sequential Traitor Tracing. In: Bellare, M. (eds) Advances in Cryptology — CRYPTO 2000. CRYPTO 2000. Lecture Notes in Computer Science, vol 1880. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44598-6_20
Download citation
DOI: https://doi.org/10.1007/3-540-44598-6_20
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67907-3
Online ISBN: 978-3-540-44598-2
eBook Packages: Springer Book Archive