DocumentCode :
1330691
Title :
Tracing traitors
Author :
Chor, Benny ; Fiat, Amos ; Naor, Moni ; Pinkas, Benny
Author_Institution :
Dept. of Comput. Sci., Technion-Israel Inst. of Technol., Haifa, Israel
Volume :
46
Issue :
3
fYear :
2000
fDate :
5/1/2000 12:00:00 AM
Firstpage :
893
Lastpage :
910
Abstract :
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in the context of pay television, where only paying customers should be able to view certain programs. In this application, the programs are normally encrypted, and then the sensitive data is the decryption keys that are given to paying customers. If a pirate decoder is found, it is desirable to reveal the source of its decryption keys. We describe fully resilient schemes which can be used against any decoder which decrypts with nonnegligible probability. Since there is typically little demand for decoders which decrypt only a small fraction of the transmissions (even if it is nonnegligible), we further introduce threshold tracing schemes which can only be used against decoders which succeed in decryption with probability greater than some threshold. Threshold schemes are considerably more efficient than fully resilient schemes
Keywords :
cryptography; decoding; telecommunication security; television networks; video signal processing; cryptographic schemes; decryption keys; fully resilient schemes; pay television; paying customers; pirate decoder; sensitive data; threshold tracing schemes; CD-ROMs; Computer science; Cryptography; Decoding; Materials science and technology; Mathematics; Protection; Subscriptions; TV broadcasting; Watermarking;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/18.841169
Filename :
841169
Link To Document :
بازگشت