Dynamic Traitor Tracing
نویسندگان
چکیده
منابع مشابه
Randomised Dynamic Traitor Tracing
Dynamic traitor tracing schemes are used to trace the source of piracy in broadcast environments such as cable TV. Dynamic schemes divide content into a series of watermarked segments that are then broadcast. The broadcast provider can adapt the watermarks according to the pirate’s response and eventually trace him/her. As dynamic algorithms are deterministic, for a given set of inputs, the tra...
متن کاملThreshold Traitor Tracing
This work presents threshold tracing schemes. Tracing schemes trace the source of keys which are used in pirate decoders for sensitive or proprietary data (such as pay-TV programs). Previous tracing schemes were designed to operate against any decoder which decrypts with a nonnegligible success probability. We introduce threshold tracing schemes which are only designed to trace the source of ke...
متن کاملIdentity-Based Traitor Tracing
We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in the asymmetric bilinear pairing setting, and that the DDH assumption holds in the group defining the first coordinate of the asymmetric pairing. Our traitor tracing system allows adaptive pirates to be traced. The sch...
متن کاملAttribute-Based Traitor Tracing
In this paper, we focus on traitor tracing scheme in attribute-based encryption (ABE) scenarios. A well-known concern in the setting of attribute-based encryption is that a user (or set of colluding users) can create a new key (or decryption device) by using his legal one and distribute it for malicious use. To mitigate this problem, we introduce the notion of attribute-based traitor tracing (A...
متن کاملSequential Traitor Tracing
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Tassa proposed dynamic traitor tracing schemes that can detect all traitors if they attempt to rebroadcast the content after it is decrypted. In their scheme the content is broken into segments and marked so that a re-b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptology
سال: 2001
ISSN: 0933-2790,1432-1378
DOI: 10.1007/s00145-001-0006-7