Cryptography Reference
In-Depth Information
Fig. 5.12. Maximizing the number of pirate generations for the evolving pirate in
the subset difference method.
the rank of traitor u maximum. We continue in this fashion until all traitors
are placed.
Claim. In the beginning of stage s > 0, there will be exactly 2 s−1 traitors
of rank 0 each one with a traitor path of length h−s.
We prove this by induction; the base case of s = 1, is easy to see: in
stage 1 there is a single traitor of traitor path length h−1 (this is the traitor
placed in the rightmost subtree in the illustration of figure 5.12 ) . Now we
prove the induction step. From stage 0 we have a single traitor of length h
that contributes a single traitor with path length h−s. Similarly, from stage 1
we have a single traitor of traitor length h−1 that contributes a single traitor
with path length h−s. From stage 2 we have 2 traitors of length h−2 that
each one contributes a single traitor of path length h−s. In general in stage
m < s we have 2 m−1 traitors that contribute each one a single traitor of path
length h−s. In total we have
s− X
2 m−1 = 2 s−1
1 +
m=1
which completes the proof of the claim.
Based on the claim, at the end of stage s > 0 there will be a total of
2 s−1 (h−s) new traitors placed. Therefore, the total number of traitors that
will be placed by the end of stage s > 0 is equal to
s X
2 m−1 (h−m) = 2 s (h−s + 1)
1 + h +
m=1
We, next, compute the number of decoders that can be produced by the
traitors placed according to the above leaking incident. Recall that corrupting
t users from T ⊂ S with respect to the above leaking incident, the evolving
pirate P annotates the traitors in Steiner tree Steiner(T,S) to apply the
strategy of Figure 5.11 .
Define K = PE R,SDDisable
P,Leaking (t) is to be the summation over height(top f (u 0 ))+
A u as stated in Theorem 5.15 where u 0
is defined as the traitor (possibly ⊥)
 
Search WWH ::




Custom Search