Breaking and Repairing Asymmetric Public-Key Traitor Tracing

Aggelos Kiayias, Moti Yung

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Traitor tracing schemes are a very useful tool for preventing piracy in digital content distribution systems. A traitor tracing procedure allows the system-manager to reveal the identities of the subscribers that were implicated in the construction of a pirate-device that illegally receives the digital content (called traitors). In an important variant called “asymmetric” traitor tracing, the system-manager is not necessarily trusted, thus the tracing procedure must produce undeniable proof of the implication of the traitor subscribers. This non-repudiation property of asymmetric schemes has the potential to significantly increase the effectiveness of the tracing procedure against piracy. In this work, we break the two previous proposals for efficient asymmetric public-key traitor tracing, by showing how traitors can evade the proposed traitor tracing procedures. Then, we present a new efficient Asymmetric Public-Key Traitor Tracing scheme for which we prove its traceability in detail (in the non-black-box model); to the best of our knowledge this is the first such scheme. Our system is capable of proving the implication of all traitors that participate in the construction of a pirate-key. We note that even though we break the earlier schemes we employ some of their fundamental techniques and thus consider them important developments towards the solution
Original languageEnglish
Title of host publicationDigital Rights Management
Subtitle of host publicationACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002. Revised Papers
EditorsJoan Feigenbaum
Place of PublicationBerlin, Heidelberg
PublisherSpringer Berlin Heidelberg
Pages32-50
Number of pages19
ISBN (Electronic)978-3-540-44993-5
ISBN (Print)978-3-540-40410-1
DOIs
Publication statusPublished - 2003

Publication series

NameLecture Notes in Computer Science
PublisherSpringer Berlin Heidelberg
Volume2696
ISSN (Print)0302-9743

Fingerprint

Dive into the research topics of 'Breaking and Repairing Asymmetric Public-Key Traitor Tracing'. Together they form a unique fingerprint.

Cite this