Traitor Tracing without A Priori Bound on the Coalition Size
Traitor tracing is an essential mechanism for discouraging the piracy in digital content distribution. An adversarial model is identified as rebroadcasting the content encrypting keys or the content in the clear form. It is possible to fight against these piracy models by employing a fingerprinting code that gives a way to differentiate the encryption capability of each individual. We point three important characteristics of a fingerprinting code that affects its deployment in traitor tracing scheme against pirate rebroadcasting: (i) A robust fingerprinting code tolerates an adversary that chooses not to rebroadcast some messages. (ii) A tracing algorithm for fingerprinting code that does not require a priori upper-bound on coalition size to be successful in detecting a traitor. (iii) Extending the length of the fingerprinting code which refers to traitor-identification procedure of the code that doesn’t depend on the length of the code or the distribution of the markings over the code.
We presented the first traitor tracing scheme with formal analysis of its success in traitor-identification that doesn’t assume a priori bound on a traitor-coalition size while at the same time it is possible to extend the code without degrading the success of traitor identification due to non-extended part. This construction also supports the robustness without requiring a high pirate rebroadcasting threshold.
Unable to display preview. Download preview PDF.
- 1.Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257–270. Springer, Heidelberg (1994)Google Scholar
- 5.Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data (extended abstract). In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)Google Scholar
- 9.Tardos, G.: Optimal probabilistic fingerprint codes. In: STOC, pp. 116–125. ACM, New York (2003)Google Scholar
- 11.Kiayias, A., Pehlivanoglu, S.: Tracing and revoking pirate rebroadcasts. In: ACNS, pp. 253–271 (2009)Google Scholar
- 12.Boneh, D., Naor, M.: Traitor tracing with constant size ciphertext. In: ACM Conference on Computer and Communications Security, pp. 501–510 (2008)Google Scholar
- 13.AACS Specifications (2006), http://www.aacsla.com/specifications/
- 14.Jin, H., Lotspiech, J., Megiddo, N.: Efficient coalition detection in traitor tracing. In: SEC, pp. 365–380 (2008)Google Scholar