Threshold traitor tracing

Moni Naor, Benny Pinkas

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

96 Scopus citations

Abstract

This work presents threshold tracing schemes. Tracing schemes trace the source of keys which are used in pirate decoders for sensitive or proprietary data (such as pay-TV programs). Previous tracing schemes were designed to operate against any decoder which decrypts with a non-negligible success probability. We introduce threshold tracing schemes which are only designed to trace the source of keys of decoders which decrypt with probability greater than some threshold q (which is a parameter). These schemes present a dramatic reduction in the overhead compared to the previous constructions of tracing schemes. We argue that in many applications it is only required to protect against pirate decoders which have a decryption probability very close to 1 (for example, TV decoders). In such applications it is therefore very favorable to use threshold tracing schemes.

Original languageEnglish
Title of host publicationAdvances in Cryptology – CRYPTO 1998 - 18th Annual International Cryptology Conference, Proceedings
EditorsHugo Krawczyk
PublisherSpringer Verlag
Pages502-517
Number of pages16
ISBN (Print)3540648925, 9783540648925
DOIs
StatePublished - 1998
Externally publishedYes
Event18th Annual International Cryptology Conference, CRYPTO 1998 - Santa Barbara, United States
Duration: 23 Aug 199827 Aug 1998

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1462
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th Annual International Cryptology Conference, CRYPTO 1998
Country/TerritoryUnited States
CitySanta Barbara
Period23/08/9827/08/98

Bibliographical note

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1998.

Fingerprint

Dive into the research topics of 'Threshold traitor tracing'. Together they form a unique fingerprint.

Cite this