Attacking traitor tracing schemes using history recording and abrupt decoders

1Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In ACM-DRM 2001, Kiayias and Yung [19] introduced a classification of pirate decoders in the context of traitor tracing that put forth traceability against history recording and abrupt pirate decoders. History recording pirate decoders are able to maintain state during the traitor tracing process while abrupt decoders can terminate the tracing operation at will based on the value of a "React" predicate. Beyond this original work, subsequently a number of other works tackled the problem of designing traitor tracing schemes against such decoders but with very limited success. In this work, we present a new attack that can be mounted by abrupt and resettable decoders. Our attack defeats the tracing algorithm that was presented in [19] (which would continue to hold only for deterministic pirate decoders). Thus we show that contrary to what is currently believed there do not exist any known tracing procedures against abrupt decoders for general plaintext distributions. We also describe an attack that can be mounted by history recording (and available) decoders. © 2011 Springer-Verlag.

Author supplied keywords

Cite

CITATION STYLE

APA

Kiayias, A., & Pehlivanoglu, S. (2011). Attacking traitor tracing schemes using history recording and abrupt decoders. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7001 LNCS, pp. 17–31). https://doi.org/10.1007/978-3-642-24861-0_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free