Abstract
This work presents threshold tracing schemes. Tracing schemes trace the source of keys which are used in pirate decoders for sensitive or proprietary data (such as pay-TV programs). Previous tracing schemes were designed to operate against any decoder which decrypts with a non-negligible success probability. We introduce threshold tracing schemes which are only designed to trace the source of keys of decoders which decrypt with probability greater than some threshold q (which is a parameter). These schemes present a dramatic reduction in the overhead compared to the previous constructions of tracing schemes.
We argue that in many applications it is only required to protect against pirate decoders which have a decryption probability very close to 1 (for example, TV decoders). In such applications it is therefore very favorable to use threshold tracing schemes.
Research supported by BSF Grant 32-00032.
Supported by an Eshkol Fellowship from the Israeli Ministry of Science.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
N. Alon, J. Bruck, J. Naor, M. Naor and R. Roth, Construction of Asymptotically Good Low-Rate Error-Correcting Codes through Pseudo-Random Graphs, IEEE Transactions on Information Theory, vol. 38 (1992), 509–516.
N. Alon and J. Spencer, The Probabilistic Method, Wiley, 1992.
R. Anderson and M. Kuhn, Tamper Resistance — A Cautionary Note, Usenix Electronic Commerce Workshop, Oakland (1996), 1–11.
E. Biham and A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, Proc. Advances in Cryptology — Crypto '97, Springr-Verlag LNCS 1294 (1997), 513–525.
D. Boneh, R. A. Demillo and R. J. Lipton, On the Importance of Checking Computations, Proc. Advances in Cryptology — Eurocrypt '97 (1997), 37–51.
D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital date, Proc. Advances in Cryptology — Crypto '95 (1995), 452–465.
J. L. Carter and M. N. Wegman, Universal Classes of Hash Functions, Journal of Computer and System Sciences 18 (1979), 143–154.
B. Chor, A. Fiat and M. Naor, Tracing Traitors, Proc. Advances in Cryptology — Crypto '94, Springr-Verlag LNCS 839 (1994), 257–270.
B. Chor, A. Fiat, M. Naor and B. Pinkas, Tracing Traitors, manuscript, (1998).
Cox I., Kilian J., Leighton T. and Shamoon T., A Secure, Robust Watermark for Multimedia, Information Hiding Workshop, Cambridge, UK, Springer-Verlag LNCS 1174, (1996), 185–206.
C. Dwork, J. Lotspiech and M. Naor, Digital Signets: Self-Enforcing Protection of Digital Information, 28th Symposium on the Theory of Computation (1996), 489–498.
P. Erdös, P. Frankl and Z. Füredi, Families of finite sets in which no set is covered by the union of r others, Israel J. of math. 51 (1985), 79–89.
A. Fiat and M. Naor, Broadcast Encryption, Proc. Advances in Cryptology — Crypto '93 (1994), 480–491.
M.L. Fredman, J. Komlós and E. Szemerédi, Storing a Sparse Table with O(1) Worst Case Access Time, Journal of the ACM, Vol 31 (1984), 538–544.
K. Mehlhorn, Data Structures and Algorithms: Sorting and Searching, Springer-Verlag (1984).
F. J. MacWilliams and N. J. A. Sloane, The Theory of Error Correcting Codes, North Holland, Amsterdam, (1977).
B. Pfitzmann, Trials of Traced Traitors, Information Hiding Workshop, Cambridge, UK, Springer-Verlag LNCS 1174, (1996), 49–64.
D.M. Wallner, E. J. Harder, R.C. Agee, Key Management for Multicast: Issues and Architectures, internet draft draft-wallner-key-arch-00.txt (1997). Available at ftp://ietf.org/internet-drafts/draft-wallner-key-arch-00.txt
M. N. Wegman and J. L. Carter, New Hash Functions and Their Use in Authentication and Set Equality, Journal of Computer and System Sciences 22 (1981), 265–279.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Naor, M., Pinkas, B. (1998). Threshold traitor tracing. In: Krawczyk, H. (eds) Advances in Cryptology — CRYPTO '98. CRYPTO 1998. Lecture Notes in Computer Science, vol 1462. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055750
Download citation
DOI: https://doi.org/10.1007/BFb0055750
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64892-5
Online ISBN: 978-3-540-68462-6
eBook Packages: Springer Book Archive