Traitor Tracing. Papers Benny Chor, Amos Fiat and Moni Naor, Tracing Traitors (1994) Moni Naor and Benny Pinkas, Threshold Traitor Tracing (1998) Presented By: Anukool Lakhina, Keren Pinkas and Scott Savarese. How this Presentation is Organized.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Benny Chor, Amos Fiat and Moni Naor, Tracing Traitors (1994)
Moni Naor and Benny Pinkas, Threshold Traitor Tracing (1998)
Presented By: Anukool Lakhina, Keren Pinkas and Scott Savarese
We want to trace the source of leaks when sensitive or proprietary data is made available to a large set of parties.
We measure the efficiency of these solutions in terms of the following parameters:
k-Resilient Traitor Tracing(Fully Resilient Traitor Tracing)
Message = <Enabling Block, Cipher Block>
s = s1 XOR s2 XOR … si … XOR sl
(4/3)k log (n/p)
(16/3)k2 log (n/p)
Threshold Traitor Tracing
Message = <enabling block, cipher block>
4k* log(1/q) / log (1/w) keys.
Two Level k-Resilient Traitor Tracing(Fully Resilient TraitorTracing)
Two Level Threshold Traitor Tracing