Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Self Protecting Pirates and Black-Box Traitor Tracing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Traitor Tracing with Constant Transmission Rate
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Efficient Traitor Tracing Algorithms Using List Decoding
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On Crafty Pirates and Foxy Tracers
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Multi-recipient Public-Key Encryption with Shortened Ciphertext
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Linear Code Implies Public-Key Traitor Tracing
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
On a Class of Traceability Codes
Designs, Codes and Cryptography
Design of Self-Healing Key Distribution Schemes
Designs, Codes and Cryptography
On a Bound of Cover-Free Families
Designs, Codes and Cryptography
A class of I.P.P. codes with efficient identification
Journal of Complexity - Special issue on coding and cryptography
Traitor tracing for prerecorded and recordable media
Proceedings of the 4th ACM workshop on Digital rights management
New Constructions for IPP Codes
Designs, Codes and Cryptography
Codes for Copyright Protection: The Case of Two Pirates
Problems of Information Transmission
Remote revocation of smart cards in a private DRM system
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
Recursive constructions of secure codes and hash families using difference function families
Journal of Combinatorial Theory Series A
Data collection with self-enforcing privacy
Proceedings of the 13th ACM conference on Computer and communications security
A fully collusion resistant broadcast, trace, and revoke system
Proceedings of the 13th ACM conference on Computer and communications security
A unified model for unconditionally secure key distribution
Journal of Computer Security
Uniqueness of some optimal superimposed codes
Problems of Information Transmission
Indentity-based broadcast signcryption
Computer Standards & Interfaces
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
Designs, Codes and Cryptography
A tree-based scheme for security of many-to-many communications
Journal of High Speed Networks - Broadband Multimedia Sensor Networks in Healthcare Applications
Adaptive traitor tracing for large anonymous attack
Proceedings of the 8th ACM workshop on Digital rights management
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract
Proceedings of the 8th ACM workshop on Digital rights management
New Considerations about the Correct Design of Turbo Fingerprinting Codes
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Data Collection with Self-Enforcing Privacy
ACM Transactions on Information and System Security (TISSEC)
Upper bounds for parent-identifying set systems
Designs, Codes and Cryptography
Improving the Boneh-Franklin Traitor Tracing Scheme
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Defending against the Pirate Evolution Attack
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Tracing and Revoking Pirate Rebroadcasts
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Broadcast encryption versus public key cryptography in content protection systems
Proceedings of the nineth ACM workshop on Digital rights management
Two-level fingerprinting codes
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Wireless broadcast encryption based on smart cards
Wireless Networks
New traceability codes against a generalized collusion attack for digital fingerprinting
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Extracting group signatures from traitor tracing schemes
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Shared generation of pseudo-random functions with cumulative maps
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Forgery attack to an asymptotically optimal traitor tracing scheme
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
A note about the traceability properties of linear codes
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Pirate evolution: how to make the most of your traitor keys
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Network-based traitor-tracing technique using traffic pattern
IEEE Transactions on Information Forensics and Security
Defending against the pirate evolution attack
International Journal of Applied Cryptography
Proceedings of the 12th ACM workshop on Multimedia and security
Robust fingerprinting codes: a near optimal construction
Proceedings of the tenth annual ACM workshop on Digital rights management
Collusion-resistant fingerprinting systems: review and recent results
Transactions on data hiding and multimedia security V
Improving the round complexity of traitor tracing schemes
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
On the effects of pirate evolution on the design of digital content distribution systems
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
Traitor tracing schemes for protected software implementations
Proceedings of the 11th annual ACM workshop on Digital rights management
Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes
Proceedings of the 11th annual ACM workshop on Digital rights management
Fingerprinting schemes. identifying the guilty sources using side information
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
A practical clumped-tree multicast encryption scheme
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Practical forensic analysis in advanced access content system
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
A traitor tracing scheme based on RSA for fast decryption
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Public traceability in traitor tracing schemes
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Efficiency of optimistic fair exchange using trusted devices
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special section on formal methods in pervasive computing, pervasive adaptation, and self-adaptive systems: Models and algorithms
A practical solution for distribution rights protection in multicast environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Fully collusion resistant traitor tracing with short ciphertexts and private keys
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
A public-key traitor tracing scheme with an optimal transmission rate
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
From non-adaptive to adaptive pseudorandom functions
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
Performance and code length optimization of joint decoding tardos fingerprinting
Proceedings of the on Multimedia and security
Renewable traitor tracing: a trace-revoke-trace system for anonymous attack
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Traitor tracing with optimal transmission rate
ISC'07 Proceedings of the 10th international conference on Information Security
Near-Optimal collusion-secure fingerprinting codes for efficiently tracing illegal re-distribution
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Bias equalizer for binary probabilistic fingerprinting codes
IH'12 Proceedings of the 14th international conference on Information Hiding
Hardness preserving reductions via cuckoo hashing
TCC'13 Proceedings of the 10th theory of cryptography conference on Theory of Cryptography
Hi-index | 754.84 |
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in the context of pay television, where only paying customers should be able to view certain programs. In this application, the programs are normally encrypted, and then the sensitive data is the decryption keys that are given to paying customers. If a pirate decoder is found, it is desirable to reveal the source of its decryption keys. We describe fully resilient schemes which can be used against any decoder which decrypts with nonnegligible probability. Since there is typically little demand for decoders which decrypt only a small fraction of the transmissions (even if it is nonnegligible), we further introduce threshold tracing schemes which can only be used against decoders which succeed in decryption with probability greater than some threshold. Threshold schemes are considerably more efficient than fully resilient schemes