An Attack on a Traitor Tracing Scheme |
Common terms and phrases
2k rounds able to catch accusing any innocent Advances in Cryptology arbitrary pirate tracing arbitrary tracing algorithm black-box confirmation algorithm black-box full-tracing black-box tracing method black-box traitor tracing Boneh and Franklin Boneh-Franklin scheme candidate coalitions catch all traitors Chor Computer Laboratory confirmation test Crypto Cryptology d₂ decoder cannot distinguish decoding circuits Decoding logic Diffie-Hellman discrete log distinct keys embedded key Encryption Eurocrypt frame innocent user Franklin scheme identify all traitors intersection invalid ciphertext Jeff Jianxin key leakage Key Traitor Tracing keys in P3 ln ho¹ lucky mod q novel pirate decoder output random bits P3 pirates P3-like pirates pirate box pirate decoder P3 pirate tracing algorithm private key process of single-key Public Key Traitor S₁ when S₁ S₂ single-key pirate tracing stateless supersets tracer knows tracer to identify tracing algorithm presented traffic analysis Traitor tracing researchers traitor tracing scheme traitors who contribute unique solution University of Cambridge unsolvable in Gq