loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Author: Hongxia Jin

Affiliation: IBM Almaden Research Center, United States

Keyword(s): Traitor Tracing, Content Protection, Anti-piracy, Anonymous Attack, Broadcast Encryption.

Related Ontology Subjects/Areas/Topics: Data Engineering ; Data Management and Quality ; Digital Rights Management ; Information and Systems Security

Abstract: In this paper we take a closer look at traitor tracing in the context of content protection, especially for anonymous attack where the attackers pirate the content and re-distribute the decrypted plain content. When the pirated copies are recovered, traitor tracing is a forensic technology that can identify the original users (called traitors) who have participated in the pirate attack and involved in the construction of the pirated copy of the content. In current state-of-art, traitor tracing scheme assumes a maximum coalition size of traitors in the system and is defined to detect one traitor, assuming the detected traitor can be disconnected and tracing just repeats with the remaining traitors. In this position paper we argue this definition does not sufficiently reflect the reality where a traitor tracing technology is used to defend against piracy especially in the context of content protection. We believe a traitor tracing scheme should deduce the active coalition size and shou ld be defined to detect all active traitors even taking into consideration that found traitors need to be technically disabled. We believe the traditional definition misleads in the design of an efficient and practical traitor tracing schemes while our definition much better fits the reality and can lead to design of efficient traitor tracing schemes for real world use. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 44.206.227.65

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Jin, H. (2008). TRAITOR TRACING FOR ANONYMOUS ATTACK IN CONTENT PROTECTION. In Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT; ISBN 978-989-8111-59-3; ISSN 2184-3236, SciTePress, pages 331-336. DOI: 10.5220/0001929003310336

@conference{secrypt08,
author={Hongxia Jin.},
title={TRAITOR TRACING FOR ANONYMOUS ATTACK IN CONTENT PROTECTION},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT},
year={2008},
pages={331-336},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001929003310336},
isbn={978-989-8111-59-3},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT
TI - TRAITOR TRACING FOR ANONYMOUS ATTACK IN CONTENT PROTECTION
SN - 978-989-8111-59-3
IS - 2184-3236
AU - Jin, H.
PY - 2008
SP - 331
EP - 336
DO - 10.5220/0001929003310336
PB - SciTePress