Abstract
Traitor tracing schemes as introduced by Chor, Fiat, and Naor at Crypto '94 are intended for tracing people who abuse a broadcast encryption scheme by allowing additional, illegitimate users to decrypt the data. The schemes should also provide legal evidence for such treachery.
We discuss and improve the quality of such evidence, i.e., the security of trials that would be held about supposedly traced traitors. In particular, previous traitor tracing schemes are symmetric in the sense that legitimate users of the broadcast information share all their secrets with the information provider. Thus they cannot offer non-repudiation. We define asymmetric traitor tracing schemes, where the provider, confronted with treachery, obtains information that he could not have produced on his own, and that is therefore much better evidence. Examples of concrete constructions are given.
We also discuss the general model of traitor tracing and propose improvements to the symmetric schemes.
Future address Universität Dortmund, Informatik VI, D-44221 Dortmund 50, Germany
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung: Perfectly-Secure Key Distribution for Dynamic Conferences; Crypto '92, LNCS 740, Springer-Verlag, Berlin 1993, 471–486.
Shimshon Berkovits: How To Broadcast A Secret; Eurocrypt '91, LNCS 547, Springer-Verlag, Berlin 1991, 535–541.
Carlo Blundo, Antonella Cresti: Space Requirements for Broadcast Encryption; Eurocrypt '94, LNCS 950, Springer-Verlag, Berlin 1995, 287–298.
G. R. Blakley, Catherine Meadows, G. B. Purdy: Fingerprinting Long Forgiving Messages; Crypto '85, LNCS 218, Springer-Verlag, Berlin 1986, 180–189.
Rolf Blom: Key Distribution for Broadcast Cryptography; Third International Conference: Security Through Science and Engineering, September 23–26, 1980, Technical University Berlin, 19–23.
Dan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data; Crypto '95, LNCS 963, Springer-Verlag, Berlin 1995, 452–465.
Gilles Brassard, David Chaum, Claude Crépeau: Minimum Disclosure Proofs of Knowledge; Journal of Computer and System Sciences 37 (1988) 156–189.
Germano Caronni: Assuring Ownership Rights for Digital Images; Proceedings VIS '95, Vieweg, Wiesbaden 1995, 251–263.
David Chaum, Ivan B. Damgard, Jeroen van de Graaf: Multiparty computations ensuring privacy of each party's input and correctness of the result; Crypto '87, LNCS 293, Springer-Verlag, Berlin 1988, 87–119.
Benny Chor, Amos Fiat, Moni Naor: Tracing traitors; Crypto '94, LNCS 839, Springer-Verlag, Berlin 1994, 257–270.
Cynthia Dwork, Jeffrey Lotspiech, Moni Naor: Digital Signets; Self-Enforcing Protection of Digital Information; to appear at 28th Symposium on Theory of Computing (STOC) 1996; preliminary version received April 1996.
Amos Fiat, Moni Naor: Broadcast Encryption; Crypto '93, LNCS 773, Springer-Verlag, Berlin 1994, 480–491.
Oded Goldreich, Silvio Micali, Avi Wigderson: How to play any mental game — or — a completeness theorem for protocols with honest majority; 19th Symposium on Theory of Computing (STOC) 1987, ACM, New York 1987, 218–229.
Birgit Pfitzmann, Matthias Schunter: Asymmetric Fingerprinting; Eurocrypt '96, LNCS 1070, Springer-Verlag, Berlin 1996, 84–95.
Neal R. Wagner: Fingerprinting; Proceedings 1983 IEEE Symposium on Security and Privacy, April 25–27 1983, Oakland, California, 18–22.
Andrew C. Yao: Protocols for Secure Computations; 23rd Symposium on Foundations of Computer Science (FOCS) 1982, IEEE Computer Society, 1982, 160–164.
Andrew C. Yao: How to Generate and Exchange Secrets; 27th Symposium on Foundations of Computer Science (FOCS) 1986, IEEE Computer Society, 1986, 162–167.
Jian Zhao, Eckhard Koch: Embedding Robust Labels Into Images For Copyright Protection; Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, R. Oldenbourg Verlag, München 1995 (also at http://www.igd.fhg.de/www/igda8/pub/EmbedLabel.ps).
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pfitzmann, B. (1996). Trials of traced traitors. In: Anderson, R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61996-8_31
Download citation
DOI: https://doi.org/10.1007/3-540-61996-8_31
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-61996-3
Online ISBN: 978-3-540-49589-5
eBook Packages: Springer Book Archive