TRAITOR TRACING FOR ANONYMOUS ATTACK IN CONTENT PROTECTION

Hongxia Jin

2008

Abstract

In this paper we take a closer look at traitor tracing in the context of content protection, especially for anonymous attack where the attackers pirate the content and re-distribute the decrypted plain content. When the pirated copies are recovered, traitor tracing is a forensic technology that can identify the original users (called traitors) who have participated in the pirate attack and involved in the construction of the pirated copy of the content. In current state-of-art, traitor tracing scheme assumes a maximum coalition size of traitors in the system and is defined to detect one traitor, assuming the detected traitor can be disconnected and tracing just repeats with the remaining traitors. In this position paper we argue this definition does not sufficiently reflect the reality where a traitor tracing technology is used to defend against piracy especially in the context of content protection. We believe a traitor tracing scheme should deduce the active coalition size and should be defined to detect all active traitors even taking into consideration that found traitors need to be technically disabled. We believe the traditional definition misleads in the design of an efficient and practical traitor tracing schemes while our definition much better fits the reality and can lead to design of efficient traitor tracing schemes for real world use.

Download


Paper Citation


in Harvard Style

Jin H. (2008). TRAITOR TRACING FOR ANONYMOUS ATTACK IN CONTENT PROTECTION . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 331-336. DOI: 10.5220/0001929003310336

in Bibtex Style

@conference{secrypt08,
author={Hongxia Jin},
title={TRAITOR TRACING FOR ANONYMOUS ATTACK IN CONTENT PROTECTION},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={331-336},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001929003310336},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - TRAITOR TRACING FOR ANONYMOUS ATTACK IN CONTENT PROTECTION
SN - 978-989-8111-59-3
AU - Jin H.
PY - 2008
SP - 331
EP - 336
DO - 10.5220/0001929003310336