Sequential Traitor Tracing

作者: Reihaneh Safavi-Naini , Yejing Wang

DOI: 10.1007/3-540-44598-6_20

关键词: TraceabilityScheme (programming language)Traitor tracingEncryptionTracingBroadcastingAlgorithmConvergence (routing)Computer scienceComputation

摘要: Traceability schemes allow detection of at least one traitor when a group colluders attempt to construct pirate decoder and gain illegal access digital content.Fiat Tassa proposed dynamic tracing that can detect all traitors if they rebroadcast the content after it is decrypted.In their scheme broken into segments marked so re-broadcasted segment be linked particular subgroup users.Mark allocation for determined re-broadcast from previous observed.They showed by careful design mark possible traitors. We consider same scenario as Fiat propose new type traceability scheme, called sequential tracing, efficiently does not require any real-time computation. That is, marking pre-determined independent segment.This very attractive allows shortened hence overall convergence time reduced. We analyse give two general constructions based on special function family, other error correcting codes. obtain these show codes has which best known result schemes.

参考文章(10)
Dan Boneh, James Shaw, Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) international cryptology conference. pp. 452- 465 ,(1995)
D. R. Stinson, R. Wei, Key Preassigned Traceability Schemes for Broadcast Encryption Selected Areas in Cryptography. pp. 144- 156 ,(1999) , 10.1007/3-540-48892-8_12
Eli Gafni, Jessica Staddon, Yiqun Lisa Yin, Efficient Methods for Integrating Traceability and Broadcast Encryption international cryptology conference. pp. 372- 387 ,(1999) , 10.1007/3-540-48405-1_24
Omer Berkman, Michal Parnas, Jiři Sgall, Efficient dynamic traitor tracing symposium on discrete algorithms. pp. 586- 595 ,(2000) , 10.5555/338219.338611
D. R. Stinson, R. Wei, Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes SIAM Journal on Discrete Mathematics. ,vol. 11, pp. 41- 53 ,(1998) , 10.1137/S0895480196304246
M.D. Swanson, M. Kobayashi, A.H. Tewfik, Multimedia data-embedding and watermarking technologies Proceedings of the IEEE. ,vol. 86, pp. 1064- 1087 ,(1998) , 10.1109/5.687830
I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia IEEE Transactions on Image Processing. ,vol. 6, pp. 1673- 1687 ,(1997) , 10.1109/83.650120
D. Boneh, J. Shaw, Collusion-secure fingerprinting for digital data IEEE Transactions on Information Theory. ,vol. 44, pp. 1897- 1905 ,(1998) , 10.1109/18.705568
Amos Fiat, Tamir Tassa, Dynamic Traitor Training international cryptology conference. pp. 354- 371 ,(1999) , 10.1007/3-540-48405-1_23
Moni Naor, Amos Fiat, Broadcast encryption international cryptology conference. pp. 480- 491 ,(1993)