loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Author: Hongxia Jin

Affiliation: IBM Almaden Research Center, United States

Keyword(s): Traitor tracing, Content protection, Anti-piracy, Broadcast encryption.

Related Ontology Subjects/Areas/Topics: Data Engineering ; Data Management and Quality ; Digital Rights Management ; Information and Systems Security

Abstract: In this paper we study the traitor tracing problem in the context of content protection. Traitor tracing is a forensic technology that attempts to detect the users who have involved in the pirate attacks when pirate evidences are recovered. There are different types of pirate attacks and each requires a different traitor tracing mechanism. We studied different types of attacks, surveyed various traitor tracing schemes and analyzed spectrum of traceabilities of different schemes using two representative schemes. We shall present some observations on the designs and their impact on the efficiency of the schemes. We shall also present various future directions that can lead to simpler and more efficient traitor tracing schemes for various pirate attacks.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.145.130.31

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Jin, H. (2009). EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION. In Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT; ISBN 978-989-674-005-4; ISSN 2184-3236, SciTePress, pages 270-273. DOI: 10.5220/0002235002700273

@conference{secrypt09,
author={Hongxia Jin.},
title={EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT},
year={2009},
pages={270-273},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002235002700273},
isbn={978-989-674-005-4},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT
TI - EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION
SN - 978-989-674-005-4
IS - 2184-3236
AU - Jin, H.
PY - 2009
SP - 270
EP - 273
DO - 10.5220/0002235002700273
PB - SciTePress