## CryptoDB

### Paper: Traitor tracing scheme with constant ciphertext rate against powerful pirates

Authors: Thomas Sirvent URL: http://eprint.iacr.org/2006/383 Search ePrint Search Google Traitor tracing schemes are used to fight piracy when distributing securely some data to multiple authorized receivers: if some receivers collude and share their decryption keys to build some pirate decoder, a tracing procedure should be able to find at least one of these traitors'' from the pirate decoder. In this paper, we consider powerful pirate decoders, which may sometimes refuse to decrypt, or may try to detect when the tracing procedure is running. Most known traitor tracing schemes are not secure against this kind of pirate decoders: this is in particular the case of the schemes with constant ciphertext rate, which are the most efficient ones. We build then a new scheme, with constant ciphertext rate and security against powerful pirate decoders, using watermarking techniques. This scheme has the interesting feature that a receiver may decrypt the ciphertexts progressively, when it was not possible in previous schemes with constant ratio between ciphertext and plaintext.
##### BibTeX
@misc{eprint-2006-21874,
title={Traitor tracing scheme with constant ciphertext rate against powerful pirates},
booktitle={IACR Eprint archive},
keywords={cryptographic protocols / traitor tracing, watermarking},
url={http://eprint.iacr.org/2006/383},
note={ thomas.sirvent@m4x.org 13454 received 2 Nov 2006},
author={Thomas Sirvent},
year=2006
}