International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Efficient Traitor Tracing Algorithms using List Decoding

Authors:
Alice Silverberg
Jessica Staddon
Judy Walker
Download:
URL: http://eprint.iacr.org/2001/016
Search ePrint
Search Google
Abstract: We apply powerful, recently discovered techniques for the list decoding of error-correcting codes to the problem of efficiently tracing traitors. Traitor tracing schemes have been extensively studied for use as a piracy deterrent. In a widely studied model for protecting digital content, each user in the system is associated with a unique set of symbols. For example, the sets may be used to install a software CD or decrypt pay-TV content. The assignment of sets is done in such a way that if a bounded collection of sets is used to form a new set to enable piracy, at least one of the traitor sets can be identified by applying a traitor tracing algorithm to the newly formed set. Much work has focused on methods for constructing such traceability schemes, but the complexity of the traitor tracing algorithms has received little attention. A widely used traitor tracing algorithm, the TA algorithm, has a running time of $O(\n)$ in general, where $\n$ is number of sets in the system (e.g., the number of copies of the CD), and therefore is inefficient for large populations. In this paper we use a coding theoretic approach to produce traceability schemes for which the TA algorithm is very fast. We show that when suitable error-correcting codes are used to construct traceability schemes, and fast list decoding algorithms are used to trace, the run time of the TA algorithm is polynomial in the codeword length. We also use the strength of the error-correcting code approach to construct traceability schemes with more efficient algorithms for finding all possible traitor coalitions. Finally, we provide evidence that amongst traceability schemes in general, TA traceability schemes are the most likely to be amenable to efficient tracing methods.
BibTeX
@misc{eprint-2001-11428,
  title={Efficient Traitor Tracing Algorithms using List Decoding},
  booktitle={IACR Eprint archive},
  keywords={traceability, traitor tracing, list decoding, error-correcting codes},
  url={http://eprint.iacr.org/2001/016},
  note={ silver@math.ohio-state.edu 11379 received 25 Feb 2001},
  author={Alice Silverberg and Jessica Staddon and Judy Walker},
  year=2001
}