Abstract
In this paper, we try to use algebraic-geometric codes (AG codes) to solve the traitor tracing problem over the broadcast channel. The scheme is shown by using AG codes to construct the linear space tracing code Γ, which is the base for the distributor to create private keys for each authorized subscribers. The obtained public key tracing scheme is deterministic and can trace all the participated traitors. Compared to the Reed-Solomon code (RS code) based public key traitor tracing scheme, our scheme can accommodate more users and tolerate more colluders given a fixed length of private keys.
Chapter PDF
References
Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257–270. Springer, Heidelberg (1994)
Pfitzmann, B.: Trials of Traced Traitors. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174. Springer, Heidelberg (1996)
Naor, M., Pinkas, B.: Threshold traitor tracing. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, p. 502. Springer, Heidelberg (1998)
Stinson, D.R., Wei, R.: Key Preassigned Traceability for Broadcast encryption. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, p. 144. Springer, Heidelberg (1999)
Stinson, D.R., Wei, R.: Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes. J. on Discrete Mathematics 11(1) (1998)
Kurosawa, K., Desmedt, Y.G.: Optimum traitor tracing and asymmetric schemes. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 145–157. Springer, Heidelberg (1998)
Kurusawa, K., Burmester, M., Desmedt, Y.: A Proven Secure Tracing Algorithm for the Optimun KD Traitor Tracing Scheme. In: Proceedings of Eurocrypt 1998 (1998)
Fiat, A., Tassa, T.: Dynamic Traitor Tracing. J. of Cryptology 4 (2001)
Berkaman, O., Parnas, M., Sgall, J.: Efficient Dynamic Traitor Tracing. J. on Computing 30(6) (2001)
Boneh, D., Franklin, M.: An efficient Public Key Traitor Tracing Scheme. In: Proc. of Crypto 1999 (1999)
Kiayias, A., Yung, M.: Self Protecting Pirates and Black-Box Traitot Tracing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 63. Springer, Heidelberg (2001)
Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Proc. of Advances in Cryptoloty, Santa Barbara, CA (August 2001)
Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Proc. of Financial Cryptography, Anguila (2000)
Magkos, E., Kotzanikolaou, P., Chrissikopoulos, V.: An Asymmetric Traceability Scheme for Copyright Protection Without Trust Assumptions. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2001. LNCS, vol. 2115, p. 186. Springer, Heidelberg (2001)
Maki, S.: On Long-Lived Public-Key Traitor Tracing. First Steps. In: Proc.of the Helsinki University of Technology, Semenar on Network Security, Fall (2000)
Safavi-Naini, R., Wang, Y.: Traitor Tracing for Shortened and Corrupted Fingerprints. In: ACM workshop on Digital Rights Management (2002)
Yan, J.J., Wu, Y.: An Attack on A Traitor Tracing Scheme., Technical Report No.518, Computer Laboratory, Univ. of Cambridge (2001)
Kiayias, A., Yung, M.: Breaking and Repairing Asymmetric Public-Key Traitor Tracing. In: ACM workshop on Digital Rights Management, DRM 2002 (2002)
Silverberg, A., Staddon, J., Walker, J.: Efficient Traitor Tracing Algorithms using List Decoding. Cryptology ePrint Archive: Report 2001/016 (2001)
Boneh, D.: The Decision Diffie-Hellman Problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 48–63. Springer, Heidelberg (1998)
van Lint, J.H., van der Geer, G.: Introduction to coding theory and Algebraic geometry. Birkhauser Verlag publisher, Boston (1988)
Guruswami, V., Sudan, M.: Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes. IEEE Transactions on Information theory 45 (1999)
Feng, G.L., Rao, T.R.N.: Improved Geometric Goppa Codes Part I: Basic Theory. IEEE Transactions on Information Theory 41(6) (1995)
Feng, G.L., Wei, V.K., Rao, T.R.N., Tzeng, K.K.: Simplified Understanding and Efficient Decoding of a Class of Algebraic-Geometric Codes. IEEE Transaction on Information Theory 40(4) (July 1994)
Feng, G.L., Rao, T.R.N.: A simple Approach for Construction of Algebraic- Geometric Codes from Affine Plane Curves. IEEE Transaction on Information Theory 40(4) (July 1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bai, C., Feng, G. (2003). Improved Algebraic Traitor Tracing Scheme. In: Zhou, J., Yung, M., Han, Y. (eds) Applied Cryptography and Network Security. ACNS 2003. Lecture Notes in Computer Science, vol 2846. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45203-4_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-45203-4_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20208-0
Online ISBN: 978-3-540-45203-4
eBook Packages: Springer Book Archive