EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION

Hongxia Jin

Abstract

In this paper we study the traitor tracing problem in the context of content protection. Traitor tracing is a forensic technology that attempts to detect the users who have involved in the pirate attacks when pirate evidences are recovered. There are different types of pirate attacks and each requires a different traitor tracing mechanism. We studied different types of attacks, surveyed various traitor tracing schemes and analyzed spectrum of traceabilities of different schemes using two representative schemes. We shall present some observations on the designs and their impact on the efficiency of the schemes. We shall also present various future directions that can lead to simpler and more efficient traitor tracing schemes for various pirate attacks.

References

  1. Boneh, D., Sahai, A., and Waters, B. (2006). Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EuroCrypto 2006, Lecture Notes in computer science, volume 4004, pages 573-592.
  2. Fiat, A. and Naor, M. (1993). Broadcast encryption. In Crypto 1993, Lecture Notes in computer science, volume 773, pages 480-491.
  3. H. Jin, J. L. (2007). Renewable traitor tracing: A tracerevoke-trace system for anonymous attack. In ESORICS 2007, pages 563-577.
  4. H. Jin, J. L. and Nusser, S. (2004). Traitor tracing for prerecorded and recordabe media. In ACM workshop on Digital Rights Management, pages 83-90.
  5. J. N. Staddon, D. S. and Wei, R. (2001). Combinatorial properties of frameproof and traceability codes. In IEEE Transactions on Information Theory, volume 47, pages 1042-1049.
  6. Jin, H., Lotspiech, J., and Megiddo, N. (2008). Efficient coalition detection for traitor tracing. In IFIP Sec 2008, pages 365-380.
  7. Naor, D., Naor, M., and Lotspiech, J. B. (2001). Revocation and tracing schemes for stateless receivers. In CRYPTO 7801, Lecture Notes in Computer Science, pages 41-62.
Download


Paper Citation


in Harvard Style

Jin H. (2009). EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 270-273. DOI: 10.5220/0002235002700273


in Bibtex Style

@conference{secrypt09,
author={Hongxia Jin},
title={EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={270-273},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002235002700273},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION
SN - 978-989-674-005-4
AU - Jin H.
PY - 2009
SP - 270
EP - 273
DO - 10.5220/0002235002700273