Traitor tracing for anonymous attack in content protection

被引:0
|
作者
Jin, Hongxia [1 ]
机构
[1] IBM Corp, Almaden Res Ctr, San Jose, CA USA
关键词
traitor tracing; content protection; anti-piracy; anonymous attack; broadcast encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we take a closer look at traitor tracing in the context of content protection, especially for anonymous attack where the attackers pirate the content and re-distribute the decrypted plain content. When the pirated copies are recovered, traitor tracing is a forensic technology that can identify the original users (called traitors) who have participated in the pirate attack and involved in the construction of the pirated copy of the content. In current state-of-art, traitor tracing scheme assumes a maximum coalition size of traitors in the system and is defined to detect one traitor, assuming the detected traitor can be disconnected and tracing just repeats with the remaining traitors. In this position paper we argue this definition does not sufficiently reflect the reality where a traitor tracing technology is used to defend against piracy especially in the context of content protection. We believe a traitor tracing scheme should deduce the active coalition size and should be defined to detect all active traitors even taking into consideration that found traitors need to be technically disabled. We believe the traditional definition misleads in the design of an efficient and practical traitor tracing schemes while our definition much better fits the reality and can lead to design of efficient traitor tracing schemes for real world use.
引用
收藏
页码:331 / 336
页数:6
相关论文
共 50 条
  • [41] GROUP TESTING MEETS TRAITOR TRACING
    Meerwald, Peter
    Furon, Teddy
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2011, : 4204 - 4207
  • [42] Public traceability in traitor tracing schemes
    Chabanne, H
    Phan, DH
    Pointcheval, D
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 542 - 558
  • [43] Traitor Tracing with Constant Size Ciphertext
    Boneh, Dan
    Naor, Moni
    [J]. CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 501 - 510
  • [44] Trade-off traitor tracing
    Ogawa, Kazuto
    Ohtake, Go
    Hanaoka, Goichiro
    Imai, Hideki
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 331 - +
  • [45] Dynamic Tardos Traitor Tracing Schemes
    Laarhoven, Thijs
    Doumen, Jeroen
    Roelse, Peter
    Skoric, Boris
    de Weger, Benne
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (07) : 4230 - 4242
  • [46] Efficient coalition detection in traitor tracing
    Jin, Hongxia
    Lotspiech, Jeffery
    Megiddo, Nimrod
    [J]. PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 365 - +
  • [47] Traitor tracing with constant transmission rate
    Kiayias, A
    Yung, M
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 450 - 465
  • [48] Traitor tracing against powerful attacks
    McNicol, S
    Boztas, S
    Rao, A
    [J]. 2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2, 2005, : 1878 - 1882
  • [49] Bayesian methods for practical traitor tracing
    Zigoris, Philip
    Jin, Hongxia
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 194 - +
  • [50] Traitor tracing for shortened and corrupted fingerprints
    Safavi-Naini, R
    Wang, YJ
    [J]. DIGITAL RIGHTS MANAGEMENT, 2002, 2696 : 81 - 100