try to apply an actual MDS code, a Reed-Solomon
(RS) code, to a real application scenario.
Assume that each segment has q variations. The
parameter q determines how much extra bandwidth is
needed to broadcast the multiple variations of the seg-
ments. A practical solution requires a small extra per-
centage, like 5% of the normal bandwidth needs. This
implies that q cannot be too large. Since the number
of codewords (thus, the number of subscribers) that
the scheme can accommodate in the application is q
k
,
a small q requires a not too small k.
Assume that we choose k = 2. Let C be an [n, 2, d]
MDS code with n = q (like an extended RS code),
thus d = n − (k − 1) = q − 1. From Corollary 3.2,
we know that the condition d > (1 − 1/m
2
)n gives a
deterministic tracing scheme for up to m traitors. This
in turn means q −1 > (1 −1/m
2
)q for C, so q > m
2
.
Therefore, the maximum number of traitors a deter-
ministic tracing scheme can handle is
√
q. However,
if q is a small number (like 16), the total number of
subscribers that can be accomodated is q
2
, which will
also be a small number. A practical tracing scheme
may require the capability to deterministically trace
more traitors than
√
q or to accomodate more sub-
scribers than q
2
. So, there are no MDS codes that
can be directly applied here and still meet these re-
quirements. For that reason, the scheme in (Safani-
Naini and Wang, 2003) may not be practical. Are we
doomed not to have a better tracing scheme simply
because the best codes are MDS? In fact, our ques-
tion is very similar to one of the open problems listed
in (J. N. Staddon and Wei, 2001) asking whether or
not we can construct an m−traceability code with
q < m
2
and a > q, where a is the number of code-
words in the code (for an [n, k, d] linear code, no-
tice that a = q
k
). This question has been affirmatively
answered in a recent paper (Trung and Martirosyan,
2004). However, the codes presented in (Trung and
Martirosyan, 2004) either have too few codewords or
the size q of the alphabet is too large for practical ap-
plications.
4 CONCLUSION
In this paper, we study the problem of tracing the le-
gitimate users (traitors) who instrument their devices
and illegally redistributing the pirated copies of the
contents or decryption keys on the Internet.
In our scheme, we systematically assign the varia-
tions for each segment to the movie and keys to the
devices. we use the two-level codes to overcome the
overhead problem to prepare the content and enable
tracing at the receipt end. Consider our concatenated
construction with parameters q = 16, n = 3825 and
k = 6. The choice of the parameters allows small ex-
tra bandwidth but large number of codewords (16 mil-
lion), much larger than q, meeting practical require-
ments.
We also provide formal analysis on traceability
code. we introduced a new concept, called ”group
distance”. We believe it is inherently more relevant
to measure the traceability of the codes. Using group
distance we showed a sufficient condition 2 for trace-
ability code. We also showed this condition is neces-
sary for MDS codes. As future work we would like
to find an efficient traceability code that satisfies con-
dition 2 but not 1. Note when traitors become bigger,
the tracing has to be probabilistic. Our current trace-
ability analysis is based on a bruteforce step 2 and
deterministic tracing. As future work, we want to de-
velop a more efficient step 2.
REFERENCES
A. Barg, R. B. and Kabatiansky, G. (2003). Digital fin-
gerprinting codes: Problem statements, constructions,
identification of traitors. In IEEE Transactions on In-
formation Theory, volume 49, pages 852–865.
B.Chor, A. Fiat, M. N., and Pinkas, B. (2000). Tracing
traitors. In IEEE Transactions on Information Theory,
volume 46, pages 893–910.
Boneh, D. and Shaw, J. (1998). Collusion-secure finger-
printing for digital data. In IEEE Trans. on Informa-
tion Theory, volume 44, No.5, pages 1897–1905.
Chor, B., Fiat, A., and Naor, M. (1994). Tracing traitors.
In Crypto 1994, Lecture Notes in computer science,
volume 839, pages 480–491.
Fiat, A. and Naor, M. (1993). Broadcast encryption. In
Crypto 1993, Lecture Notes in computer science, vol-
ume 773, pages 480–491.
Fiat, A. and Tassa, T. (1999). Dynamic traitor tracing. In
Crypto 1999, Lecture Notes in computer science, vol-
ume 1666, pages 354–371.
I. Cox, J. Killian, T. L. and Shamoon, T. (1997). Secure
spread spectrum watermarking for multimedia,. In
IEEE Transactions on Imaging Processing, volume
6(12), pages 1673–1687.
J. N. Staddon, D. S. and Wei, R. (2001). Combinato-
rial properties of frameproof and traceability codes.
In IEEE Transactions on Information Theory, vol-
ume 47, pages 1042–1049.
Safani-Naini, R. and Wang, Y. (2003). Sequential traitor
tracing. In IEEE Transactions on Information Theory,
volume 49, No.5, pages 1319–1326.
Trung, T. V. and Martirosyan, S. (2004). On a class of trace-
ability codes. In Design, Codes and Cryptography,
volume 31(2), pages 125–132.
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
228