Traitor tracing for anonymous attack in content protection

被引:0
|
作者
Jin, Hongxia [1 ]
机构
[1] IBM Corp, Almaden Res Ctr, San Jose, CA USA
关键词
traitor tracing; content protection; anti-piracy; anonymous attack; broadcast encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we take a closer look at traitor tracing in the context of content protection, especially for anonymous attack where the attackers pirate the content and re-distribute the decrypted plain content. When the pirated copies are recovered, traitor tracing is a forensic technology that can identify the original users (called traitors) who have participated in the pirate attack and involved in the construction of the pirated copy of the content. In current state-of-art, traitor tracing scheme assumes a maximum coalition size of traitors in the system and is defined to detect one traitor, assuming the detected traitor can be disconnected and tracing just repeats with the remaining traitors. In this position paper we argue this definition does not sufficiently reflect the reality where a traitor tracing technology is used to defend against piracy especially in the context of content protection. We believe a traitor tracing scheme should deduce the active coalition size and should be defined to detect all active traitors even taking into consideration that found traitors need to be technically disabled. We believe the traditional definition misleads in the design of an efficient and practical traitor tracing schemes while our definition much better fits the reality and can lead to design of efficient traitor tracing schemes for real world use.
引用
收藏
页码:331 / 336
页数:6
相关论文
共 50 条
  • [1] New traitor tracing scheme against anonymous attack
    Yang, Chen
    Ma, Wenping
    Wang, Xinmei
    [J]. ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 389 - +
  • [2] EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION
    Jin, Hongxia
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 270 - 273
  • [3] Renewable traitor tracing: A trace-revoke-trace system for anonymous attack
    Jin, Hongxia
    Lotspiech, Jeffery
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 563 - +
  • [4] Unifying Broadcast Encryption and Traitor Tracing for Content Protection
    Jin, Hongxia
    Lotspiech, Jeffrey
    [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 139 - 148
  • [5] Flexible traitor tracing for anonymous attacks
    Jin, HX
    Lotspiech, J
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 3677 : 269 - 270
  • [6] A closer look at broadcast encryption and traitor tracing for content protection
    Jin, Hongxia
    [J]. SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 295 - 298
  • [7] An anonymous asymmetric public key traitor tracing scheme
    Choi, EY
    Hwang, JY
    Lee, DH
    [J]. E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2003, 2738 : 104 - 114
  • [8] Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
    Nishimaki, Ryo
    Wichs, Daniel
    Zhandry, Mark
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 388 - 419
  • [9] Traitor tracing scheme and digital copyright protection
    Lab. of Computer Network and Info. Security, Xidian Univ., Xi'an 710071, China
    [J]. Jisuanji Gongcheng, 2006, 2 (151-152):
  • [10] Forgery attack to an asymptotically optimal traitor tracing scheme
    Wu, Yongdong
    Bao, Feng
    Deng, Robert H.
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 171 - +