loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Hongxia Jin 1 ; Jeffory Lotspiech 1 and Mario Blaum 2

Affiliations: 1 IBM Almaden Research Center, United States ; 2 Hitachi Global Storage Technologies, United States

Keyword(s): Traitor tracing, error correcting code, traceability code.

Related Ontology Subjects/Areas/Topics: Coding Theory and Practice ; Cryptographic Techniques and Key Management ; Data Engineering ; Data Management and Quality ; Digital Rights Management ; Information and Systems Security

Abstract: In this paper we study the traitor tracing problem, which originates in attempting to combat piracy of copy-righted materials. When a pirated copy of the material is observed, a traitor tracing scheme should allow to identify at least one of the real subscribers (traitors) who participate in the construction of a pirated copy. In this paper, we focus on the pay-per-view type of subscription-based scenarios, in which materials are divided into multiple segments and each segment has multiple variations. We present a systematic way to assign the variations for each segment and for each subscriber using an error-correcting code. We give sufficient conditions for a code to be able to trace at least a traitor when faced with a coalition of m traitors. We also prove that these sufficient conditions are also necessary when the code is an MDS code.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.208.135.174

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Jin, H.; Lotspiech, J. and Blaum, M. (2006). TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS. In Proceedings of the International Conference on Security and Cryptography (ICETE 2006) - SECRYPT; ISBN 978-972-8865-63-4; ISSN 2184-3236, SciTePress, pages 223-228. DOI: 10.5220/0002097202230228

@conference{secrypt06,
author={Hongxia Jin. and Jeffory Lotspiech. and Mario Blaum.},
title={TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2006) - SECRYPT},
year={2006},
pages={223-228},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002097202230228},
isbn={978-972-8865-63-4},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2006) - SECRYPT
TI - TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS
SN - 978-972-8865-63-4
IS - 2184-3236
AU - Jin, H.
AU - Lotspiech, J.
AU - Blaum, M.
PY - 2006
SP - 223
EP - 228
DO - 10.5220/0002097202230228
PB - SciTePress