Volume 5 - Issue 1
One anonymous and revocable DRM scheme
Abstract
Traitor tracing schemes were introduced so as to combat the typical piracy scenario whereby pirate decoders (or access control smart-cards) are manufactured and sold by pirates to illegal subscribers. This new piracy scenario became especially attractive to pirates in the context of broadband multicast over the Internet. In this paper we proposed a new traitor tracing scheme with revocation capability which can be used in digital right management. Each receiver holds one decryption key only, and when traitors are found, we can revoke their private keys without updating the private keys of other receivers. In particular, no revocation messages are broadcast and all receivers do nothing. It is conceptually simple and fully k-resilient, that is, it can find all traitors if the number of them is k or less. The encryption algorithm of our scheme is secure assuming that the discrete logarithm problem is hard.
Paper Details
PaperID: 65649106249
Author's Name: Liu, J., Zhao, L., Wang, X.
Volume: Volume 5
Issues: Issue 1
Keywords: Bilinear map, Broadcast encryption, Right management, Traitor tracing
Year: 2009
Month: February
Pages: 29-34