loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Author: Hongxia Jin

Affiliation: IBM Almaden Research Center, United States

Keyword(s): Content Protection, Broadcast Encryption, Traitor Tracing, Anti-piracy.

Related Ontology Subjects/Areas/Topics: Data Engineering ; Data Management and Quality ; Digital Rights Management ; Information and Systems Security

Abstract: In this paper we take a closer look at broadcast encryption and traitor tracing in the context of content protection. In current state-of-art, these are viewed as two separate and orthogonal problems. In this paper we challenge this separation. We presented example that shows it can be insecure if a broadcast encryption scheme offers no traceability. We also show it is insufficient to have a traitor tracing scheme that does not have revocation capability and does not support multi-time tracing. Furthermore we show supporting multi-time tracing may actually mean a traitor tracing scheme also needs to have broadcast capability. We hope the evidences we presented in this paper can raise the awareness of the connections between these two problems and shed new insights on future research directions in this important area.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.145.37.219

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Jin, H. (2007). A CLOSER LOOK AT BROADCAST ENCRYPTION AND TRAITOR TRACING FOR CONTENT PROTECTION. In Proceedings of the Second International Conference on Security and Cryptography (ICETE 2007) - SECRYPT; ISBN 978-989-8111-12-8; ISSN 2184-3236, SciTePress, pages 295-298. DOI: 10.5220/0002128502950298

@conference{secrypt07,
author={Hongxia Jin.},
title={A CLOSER LOOK AT BROADCAST ENCRYPTION AND TRAITOR TRACING FOR CONTENT PROTECTION},
booktitle={Proceedings of the Second International Conference on Security and Cryptography (ICETE 2007) - SECRYPT},
year={2007},
pages={295-298},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002128502950298},
isbn={978-989-8111-12-8},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the Second International Conference on Security and Cryptography (ICETE 2007) - SECRYPT
TI - A CLOSER LOOK AT BROADCAST ENCRYPTION AND TRAITOR TRACING FOR CONTENT PROTECTION
SN - 978-989-8111-12-8
IS - 2184-3236
AU - Jin, H.
PY - 2007
SP - 295
EP - 298
DO - 10.5220/0002128502950298
PB - SciTePress