Abstract
This work presents threshold tracing schemes. Tracing schemes trace the source of keys which are used in pirate decoders for sensitive or proprietary data (such as pay-TV programs). Previous tracing schemes were designed to operate against any decoder which decrypts with a non-negligible success probability. We introduce threshold tracing schemes which are only designed to trace the source of keys of decoders which decrypt with probability greater than some threshold q (which is a parameter). These schemes present a dramatic reduction in the overhead compared to the previous constructions of tracing schemes. We argue that in many applications it is only required to protect against pirate decoders which have a decryption probability very close to 1 (for example, TV decoders). In such applications it is therefore very favorable to use threshold tracing schemes.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology – CRYPTO 1998 - 18th Annual International Cryptology Conference, Proceedings |
Editors | Hugo Krawczyk |
Publisher | Springer Verlag |
Pages | 502-517 |
Number of pages | 16 |
ISBN (Print) | 3540648925, 9783540648925 |
DOIs | |
State | Published - 1998 |
Externally published | Yes |
Event | 18th Annual International Cryptology Conference, CRYPTO 1998 - Santa Barbara, United States Duration: 23 Aug 1998 → 27 Aug 1998 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 1462 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 18th Annual International Cryptology Conference, CRYPTO 1998 |
---|---|
Country/Territory | United States |
City | Santa Barbara |
Period | 23/08/98 → 27/08/98 |
Bibliographical note
Publisher Copyright:© Springer-Verlag Berlin Heidelberg 1998.