Some Simple Pirate Strategies

نویسندگان

  • Tina Lindkvist
  • Jacob Löfvenberg
چکیده

Illegal copies of digital objects (images, texts, movies, music etc.) are easy to make. With the use of Internet more and more products are distributed in its digital form. To prevent illegal redistribution we propose to uniquely mark each distributed copy with a digital fingerprint. This fingerprint has to be part of the information to prevent it from being easily removed. This method is discussed for example in [1], [2], [3] and [4].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A General Description of Pirate Strategies in a Binary Fingerprinting System

The paper describes all possible pirate strategies in a binary fingerprinting scheme. It is shown how to make a compact representation of the strategies by choosing representatives from equivalence classes of pirate strategies.

متن کامل

The Pirate Bay, Grokster, and Google

The Pirate Bay. Three simple words. Such strong reactions. Proponents point to a vibrant forum for distributing files. Critics lament massive pirating of copyrighted works. The Swedish district court recently found The Pirate Bay (TPB) guilty of making copyrighted works available. This article explores the consequences of this decision. It first explains the technology underlying TPB and provid...

متن کامل

Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate

Stateful pirate decoders are history recording and abrupt pirate decoders. These decoders can keep states between decryptions to detect whether they are being traced and are then able to take some counter-actions against the tracing process, such as “shutting down” or erasing all internal information. We propose the first constant ciphertext rate scheme which copes with such pirate decoders. Ou...

متن کامل

An Attack on A Traitor Tracing Scheme

In Crypto’99, Boneh and Franklin proposed a public key traitor tracing scheme [1], which was believed to be able to catch all traitors while not accusing any innocent users (i.e., full-tracing and errorfree). Assuming that Decision Diffie-Hellman problem is unsolvable in Gq, Boneh and Franklin proved that a decoder cannot distinguish valid ciphertexts from invalid ones that are used for tracing...

متن کامل

Traitor tracing scheme with constant ciphertext rate against powerful pirates

Traitor tracing schemes are used to fight piracy when distributing securely some data to multiple authorized receivers: if some receivers collude and share their decryption keys to build some pirate decoder, a tracing procedure should be able to find at least one of these “traitors” from the pirate decoder. In this paper, we consider powerful pirate decoders, which may sometimes refuse to decry...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000