A public-key traitor tracing scheme with an optimal transmission rate

Yi Ruei Chen*, Wen-Guey Tzeng

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

The way of transmitting the encrypted digital content to the legitimate subscribers over a broadcast channel has wide commercial applications, such as Pay-TV, DVD, etc. In order to discourage the legitimate subscribers from giving away their decryption keys, the traitor tracing scheme comes up. In this paper, we propose a public-key traitor tracing scheme that has optimal transmission rate. In other words, our scheme enables everyone to transmit the encrypted digital contents almost without any redundancy. As for tracing, our scheme supports black-box tracing, i.e., identifying colluders without opening the pirate decoder. Moreover, in our scheme, the storage requirement for legitimate subscribers and digital content broadcasters is smaller than that of previous schemes.

Original languageEnglish
Title of host publicationInformation and Communications Security - 11th International Conference, ICICS 2009, Proceedings
Pages121-134
Number of pages14
DOIs
StatePublished - 1 Dec 2009
Event11th International Conference on Information and Communications Security, ICICS 2009 - Beijing, China
Duration: 14 Dec 200917 Dec 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5927 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th International Conference on Information and Communications Security, ICICS 2009
CountryChina
CityBeijing
Period14/12/0917/12/09

Keywords

  • Fingerprinting code
  • Traitor tracing
  • Transmission rate

Fingerprint Dive into the research topics of 'A public-key traitor tracing scheme with an optimal transmission rate'. Together they form a unique fingerprint.

Cite this