Presentation 1999/7/23
Tracing and Masking Traitors
Maki YOSHIDA, Toru FUJIWARA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) This paper presents a traitor tracing scheme with maskable distribution. A traitor tracing scheme is a broadcast encryption scheme such that the data supplier can trace malicious authorized users (traitors) who leak their keys to an unauthorized user (a pirate user). A traitor tracing scheme can be used for pay-TV, CD-ROM distribution and online databases. To apply the scheme to an information providing service with periodic payment, it is required that even an authorized user cannot decrypt the data while he is in arrears with payment. In this paper, we propose a traitor tracing scheme with maskable distribution: For the authorized users and every data to be distributed, the data supplier can arbitrarily choose the subset of authorized users who cannot decrypt the data (masked users). Thus, traitors are easily expelled by being masked users, without affecting other authorized users. For the application where a masked user does not malicious, the privacy of masked users should not be disturbed. We present the privacy preserving scheme in the sense that no user can determine whether an authorized user is masked or not, except for himself.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Pay TV / Broadcast encryption / Traitor / Traitor tracing / Masking / Privacy
Paper # ISEC99-28
Date of Issue

Conference Information
Committee ISEC
Conference Date 1999/7/23(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Tracing and Masking Traitors
Sub Title (in English)
Keyword(1) Pay TV
Keyword(2) Broadcast encryption
Keyword(3) Traitor
Keyword(4) Traitor tracing
Keyword(5) Masking
Keyword(6) Privacy
1st Author's Name Maki YOSHIDA
1st Author's Affiliation Department of Informatics and Mathematical Science, Osaka University()
2nd Author's Name Toru FUJIWARA
2nd Author's Affiliation Department of Informatics and Mathematical Science, Osaka University
Date 1999/7/23
Paper # ISEC99-28
Volume (vol) vol.99
Number (no) 209
Page pp.pp.-
#Pages 8
Date of Issue