loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Chiara Valentina Schiavo and Andrea Visconti

Affiliation: Universitá degli Studi di Milano, Italy

ISBN: 978-989-8565-24-2

Keyword(s): Traitor Tracing Schemes, Piracy, Digital Content Distribution Systems, Pirate Decoders, Traitors.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Data Management and Quality ; Databases and Data Security ; Digital Rights Management ; Information and Systems Security

Abstract: To overcome the piracy problem in digital content distribution systems, a number of traitor tracing schemes have been suggested by researchers. The goal of these schemes is to enable the tracer to identify at least one of the traitors. In this context, Matsushita and Imai (2004) proposed a black-box tracing scheme with sublinear header size that is able to perform tracing of self-defensive pirate decoders. Kiayias and Pehlivanoglu (2009) proved that this scheme is vulnerable to an attack which allows an illicit decoder to recognize normal ciphertext to tracing ones and distinguish two consecutive tracing ciphertexts. For making the scheme no more susceptible to such attack, authors modified the encryption phase and assumed that traitors belong to the same user group. In this paper, we present a solution that has no traitors restrictions, repairing the scheme totally. In particular, we modified the tracing scheme proving that (a) a pirate decoder is not able to recognize normal ciphert ext to tracing ones with sufficiently high probability, and (b) the statistical distance between two consecutive tracing operations is negligible under Decision Diffie Hellman assumption. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 100.26.176.182

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Valentina Schiavo, C. and Visconti, A. (2012). An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 302-307. DOI: 10.5220/0004074003020307

@conference{secrypt12,
author={Chiara Valentina Schiavo. and Andrea Visconti.},
title={An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={302-307},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004074003020307},
isbn={978-989-8565-24-2},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size
SN - 978-989-8565-24-2
AU - Valentina Schiavo, C.
AU - Visconti, A.
PY - 2012
SP - 302
EP - 307
DO - 10.5220/0004074003020307

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.