2011
DOI: 10.1007/978-3-642-21031-0_23
|View full text |Cite
|
Sign up to set email alerts
|

Traitor Tracing against Public Collaboration

Abstract: Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some users may give out their decryption keys to construct pirate decoders. There are many traitor tracing schemes based on collusion secure codes and identifiable parent property codes. However, these schemes are subject to public collaboration of traitors, which is presented by Billet and Phan in EUROCRYPT 2009 as an attack against code… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Finally, in a recently proposed work [ZZ11], the authors also proposed a method to deal with pirates 2.0 in code-based schemes. In fact, their method is essentially similar to the method in [ADML + 07] except that they split the second level in [ADML + 07] into L levels (L is the length of code).…”
Section: Related Workmentioning
confidence: 99%
“…Finally, in a recently proposed work [ZZ11], the authors also proposed a method to deal with pirates 2.0 in code-based schemes. In fact, their method is essentially similar to the method in [ADML + 07] except that they split the second level in [ADML + 07] into L levels (L is the length of code).…”
Section: Related Workmentioning
confidence: 99%
“…We compare our scheme with several codes based schemes [2,3,5,6,7,8,9] in Table 1. In the comparison, all schemes are assumed to employ codewords of the same length L. In schemes that did not mention the employed public key encryption scheme (such as [5] and [6]), we assume that secure ElGamal encryption over a cyclic group of a large prime order p is used.…”
Section: Efficiency Analysismentioning
confidence: 99%
“…Chor et al [1] presented the first traitor tracing scheme against pirate decoders. Since then, many traitor tracing schemes against pirate decoders have been proposed and among them there is a kind of traitor tracing schemes called codes based schemes (such as [2,3,4,5,6,7,8]). In these schemes, each user is assigned decryption keys according to each bit of his/her codeword.…”
Section: Introductionmentioning
confidence: 99%