Efficient traitor tracing from collusion secure codes

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we describe a new traitor tracing scheme which relies on Tardos' collusion secure codes to achieve constant size ciphertexts. Our scheme is also equipped with a black-box tracing procedure against pirates that are allowed to decrypt with some (possibly high) error rate while keeping the decoders of the lowest possible size when using collusion secure codes, namely of size proportional to the length of Tardos' code.

Original languageEnglish
Title of host publicationInformation Theoretic Security - Third International Conference, ICITS 2008, Proceedings
Pages171-182
Number of pages12
DOIs
Publication statusPublished - 27 Oct 2008
Externally publishedYes
Event3rd International Conference on Information Theoretic Security, ICITS 2008 - Calgary, AB, Canada
Duration: 10 Aug 200813 Aug 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5155 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Conference on Information Theoretic Security, ICITS 2008
Country/TerritoryCanada
CityCalgary, AB
Period10/08/0813/08/08

Fingerprint

Dive into the research topics of 'Efficient traitor tracing from collusion secure codes'. Together they form a unique fingerprint.

Cite this