Combinatorial schemes for broadcast encryption
Dr. Yujie Gu
School of Electrical Engineering
Department of Systems
Tel Aviv University
Abstract:
In 1994, Chor, Fiat and Naor developed a mathematical approach of traitor tracing to protect copyrighted content in broadcast encryption, which is able to reveal the source of pirate copies in collusion attacks. Later various traitor tracing schemes were introduced and investigated from the combinatorial perspective. Among others, Hollmann, van Lint, Linnartz and Tolhuizen proposed codes with the identifiable parent property (IPP codes) in 1998, which guarantee to identify at least one traitor in a collusion attack. In this talk, we mainly focus on IPP codes and their generalizations to set systems based on Shamir’s secret sharing scheme. Bounds and (optimal) constructions for these combinatorial structures are derived by using techniques in extremal combinatorics, combinatorial design theory, additive number theory, and the probabilistic method.
Biography:
Yujie Gu received her Ph.D. degree from Graduate School of Systems and Information Engineering, University of Tsukuba, Japan, in 2018. She is currently a postdoc at Department of Electrical Engineering – Systems, Tel Aviv University, Israel. Her research interests include extremal combinatorics, coding theory, information theory, and their interactions.