Traitors collaborating in public: Pirates 2.0

Olivier Billet, Duong Hieu Phan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This work introduces a new concept of attack against traitor tracing schemes. We call attacks of this type Pirates 2.0 attacks as they result from traitors collaborating together in a public way. In other words, traitors do not secretly collude but display part of their secret keys in a public place; pirate decoders are then built from this public information. The distinguishing property of Pirates 2.0 attacks is that traitors only contribute partial information about their secret key material which suffices to produce (possibly imperfect) pirate decoders while allowing them to remain anonymous. The side-effect is that traitors can publish their contributed information without the risk of being traced; giving such strong incentives to some of the legitimate users to become traitors allows coalitions to attain very large sizes that were deemed unrealistic in some previously considered models of coalitions. This paper proposes a generic model for this new threat, that we use to assess the security of some of the most famous traitor tracing schemes. We exhibit several Pirates 2.0 attacks against these schemes, providing new theoretical insights with respect to their security. We also describe practical attacks against various instances of these schemes. Eventually, we discuss possible variations on the Pirates 2.0 theme.

Original languageEnglish
Title of host publicationAdvances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Pages189-205
Number of pages17
DOIs
Publication statusPublished - 23 Jul 2009
Externally publishedYes
Event28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009 - Cologne, Germany
Duration: 26 Apr 200930 Apr 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5479 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009
Country/TerritoryGermany
CityCologne
Period26/04/0930/04/09

Fingerprint

Dive into the research topics of 'Traitors collaborating in public: Pirates 2.0'. Together they form a unique fingerprint.

Cite this