Some Simple Pirate Strategies
نویسندگان
چکیده
Illegal copies of digital objects (images, texts, movies, music etc.) are easy to make. With the use of Internet more and more products are distributed in its digital form. To prevent illegal redistribution we propose to uniquely mark each distributed copy with a digital fingerprint. This fingerprint has to be part of the information to prevent it from being easily removed. This method is discussed for example in [1], [2], [3] and [4].
منابع مشابه
A General Description of Pirate Strategies in a Binary Fingerprinting System
The paper describes all possible pirate strategies in a binary fingerprinting scheme. It is shown how to make a compact representation of the strategies by choosing representatives from equivalence classes of pirate strategies.
متن کاملThe Pirate Bay, Grokster, and Google
The Pirate Bay. Three simple words. Such strong reactions. Proponents point to a vibrant forum for distributing files. Critics lament massive pirating of copyrighted works. The Swedish district court recently found The Pirate Bay (TPB) guilty of making copyrighted works available. This article explores the consequences of this decision. It first explains the technology underlying TPB and provid...
متن کاملTraitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate
Stateful pirate decoders are history recording and abrupt pirate decoders. These decoders can keep states between decryptions to detect whether they are being traced and are then able to take some counter-actions against the tracing process, such as “shutting down” or erasing all internal information. We propose the first constant ciphertext rate scheme which copes with such pirate decoders. Ou...
متن کاملAn Attack on A Traitor Tracing Scheme
In Crypto’99, Boneh and Franklin proposed a public key traitor tracing scheme [1], which was believed to be able to catch all traitors while not accusing any innocent users (i.e., full-tracing and errorfree). Assuming that Decision Diffie-Hellman problem is unsolvable in Gq, Boneh and Franklin proved that a decoder cannot distinguish valid ciphertexts from invalid ones that are used for tracing...
متن کاملTraitor tracing scheme with constant ciphertext rate against powerful pirates
Traitor tracing schemes are used to fight piracy when distributing securely some data to multiple authorized receivers: if some receivers collude and share their decryption keys to build some pirate decoder, a tracing procedure should be able to find at least one of these “traitors” from the pirate decoder. In this paper, we consider powerful pirate decoders, which may sometimes refuse to decry...
متن کامل