loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Chiara Valentina Schiavo and Andrea Visconti

Affiliation: Universitá degli Studi di Milano, Italy

Keyword(s): Traitor Tracing Schemes, Piracy, Digital Content Distribution Systems, Pirate Decoders, Traitors.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Data Management and Quality ; Databases and Data Security ; Digital Rights Management ; Information and Systems Security

Abstract: To overcome the piracy problem in digital content distribution systems, a number of traitor tracing schemes have been suggested by researchers. The goal of these schemes is to enable the tracer to identify at least one of the traitors. In this context, Matsushita and Imai (2004) proposed a black-box tracing scheme with sublinear header size that is able to perform tracing of self-defensive pirate decoders. Kiayias and Pehlivanoglu (2009) proved that this scheme is vulnerable to an attack which allows an illicit decoder to recognize normal ciphertext to tracing ones and distinguish two consecutive tracing ciphertexts. For making the scheme no more susceptible to such attack, authors modified the encryption phase and assumed that traitors belong to the same user group. In this paper, we present a solution that has no traitors restrictions, repairing the scheme totally. In particular, we modified the tracing scheme proving that (a) a pirate decoder is not able to recognize normal cipher text to tracing ones with sufficiently high probability, and (b) the statistical distance between two consecutive tracing operations is negligible under Decision Diffie Hellman assumption. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.163.218.81

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Valentina Schiavo, C. and Visconti, A. (2012). An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size. In Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT; ISBN 978-989-8565-24-2; ISSN 2184-3236, SciTePress, pages 302-307. DOI: 10.5220/0004074003020307

@conference{secrypt12,
author={Chiara {Valentina Schiavo}. and Andrea Visconti.},
title={An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT},
year={2012},
pages={302-307},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004074003020307},
isbn={978-989-8565-24-2},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT
TI - An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size
SN - 978-989-8565-24-2
IS - 2184-3236
AU - Valentina Schiavo, C.
AU - Visconti, A.
PY - 2012
SP - 302
EP - 307
DO - 10.5220/0004074003020307
PB - SciTePress