Traitor tracing schemes for protected software implementations

  • Authors:
  • Marc Joye;Tancrède Lepoint

  • Affiliations:
  • Technicolor, Cesson-Sevigne, France;Technicolor, Cesson-Sevigne, France

  • Venue:
  • Proceedings of the 11th annual ACM workshop on Digital rights management
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper considers the problem of converting an encryption scheme into a scheme in which there is one encryption process but several decryption processes. Each decryption process is made available as a protected software implementation (decoder). So, when some digital content is encrypted, a legitimate user can recover the content in clear using its own private software implementation. Moreover, it is possible to trace a decoder in a black-box fashion in case it is suspected to be an illegal copy. Our conversions assume software tamper-resistance.