EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION

Hongxia Jin

2009

Abstract

In this paper we study the traitor tracing problem in the context of content protection. Traitor tracing is a forensic technology that attempts to detect the users who have involved in the pirate attacks when pirate evidences are recovered. There are different types of pirate attacks and each requires a different traitor tracing mechanism. We studied different types of attacks, surveyed various traitor tracing schemes and analyzed spectrum of traceabilities of different schemes using two representative schemes. We shall present some observations on the designs and their impact on the efficiency of the schemes. We shall also present various future directions that can lead to simpler and more efficient traitor tracing schemes for various pirate attacks.

Download


Paper Citation


in Harvard Style

Jin H. (2009). EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 270-273. DOI: 10.5220/0002235002700273

in Bibtex Style

@conference{secrypt09,
author={Hongxia Jin},
title={EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={270-273},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002235002700273},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION
SN - 978-989-674-005-4
AU - Jin H.
PY - 2009
SP - 270
EP - 273
DO - 10.5220/0002235002700273