Traitor tracing schemes for protected software implementations

Marc Joye, Tancrède Lepoint
2011 Proceedings of the 11th annual ACM workshop on Digital rights management - DRM '11  
This paper considers the problem of converting an encryption scheme into a scheme in which there is one encryption process but several decryption processes. Each decryption process is made available as a protected software implementation (decoder). So, when some digital content is encrypted, a legitimate user can recover the content in clear using its own private software implementation. Moreover, it is possible to trace a decoder in a black-box fashion in case it is suspected to be an illegal
more » ... opy. Our conversions assume software tamper-resistance.
doi:10.1145/2046631.2046636 dblp:conf/drm/JoyeL11 fatcat:q7vdsdok2vemjfqtzkalz5temm