Copyrighting public-key encryption and black-box traitor tracing
Copyrighting a function refers to the process of embedding hard-to-remove marks in the function’s implementation while retaining its functionality. We present two methods for copyrighting discrete-log based public-key encryption functions and show how one can modularly obtain public-key traitor tracing schemes by composing copyrighted encryption with collusion secure code families. We provide a formalization of the notion of blackbox traitor tracing that is the first that takes into account adversarially chosen plaintext distributions and we argue the security of our constructions in this setting. Regarding the modular approach, our constructions demonstrate how one can derive public-key traitor tracing by reducing the required “marking assumption” of collusion-secure codes to cryptographic hardness assumptions.