TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS

Hongxia Jin, Jeffory Lotspiech, Mario Blaum

2006

Abstract

In this paper we study the traitor tracing problem, which originates in attempting to combat piracy of copy-righted materials. When a pirated copy of the material is observed, a traitor tracing scheme should allow to identify at least one of the real subscribers (traitors) who participate in the construction of a pirated copy. In this paper, we focus on the pay-per-view type of subscription-based scenarios, in which materials are divided into multiple segments and each segment has multiple variations. We present a systematic way to assign the variations for each segment and for each subscriber using an error-correcting code. We give sufficient conditions for a code to be able to trace at least a traitor when faced with a coalition of m traitors. We also prove that these sufficient conditions are also necessary when the code is an MDS code.

Download


Paper Citation


in Harvard Style

Jin H., Lotspiech J. and Blaum M. (2006). TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 223-228. DOI: 10.5220/0002097202230228

in Bibtex Style

@conference{secrypt06,
author={Hongxia Jin and Jeffory Lotspiech and Mario Blaum},
title={TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={223-228},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002097202230228},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS
SN - 978-972-8865-63-4
AU - Jin H.
AU - Lotspiech J.
AU - Blaum M.
PY - 2006
SP - 223
EP - 228
DO - 10.5220/0002097202230228