Filters








1,008 Hits in 1.9 sec

Sequential Traitor Tracing [chapter]

Reihaneh Safavi-Naini, Yejing Wang
2000 Lecture Notes in Computer Science  
We consider the same scenario as Fiat and Tassa and propose a new type of traceability scheme, called sequential traitor tracing, that can efficiently detect all traitors and does not require any real-time  ...  Fiat and Tassa proposed dynamic traitor tracing schemes that can detect all traitors if they attempt to rebroadcast the content after it is decrypted.  ...  Sequential Traitor Tracing One of the main drawbacks of FT model is the high real-time computation required for allocation of marks for each segment.  ... 
doi:10.1007/3-540-44598-6_20 fatcat:4gzldvcfkneqnjk4a2z2jhdbs4

Sequential traitor tracing

R. Safavi-Naini, Yejing Wang
2003 IEEE Transactions on Information Theory  
We consider a new type of traitor tracing scheme, called sequential traitor tracing, that protects against rebroadcasting of decrypted content.  ...  Abstract-We consider a new type of traitor tracing scheme, called sequential traitor tracing, that protects against rebroadcasting of decrypted content.  ...  We call the system sequential traitor tracing scheme to emphasise the fact that the traitors are identified sequentially, that is, when a colluder is found he is disconnected and the system proceeds to  ... 
doi:10.1109/tit.2003.810629 fatcat:gtxdxxz42zdsxandeus4dfyjxi

A Code for Sequential Traitor Tracing [chapter]

Reihaneh Safavi-Naini, Yejing Wang
The International Series in Engineering and Computer Science  
Traitor tracing schemes ensure that at least one of the at most c colluders who construct a pirate decoder 1 to illegally access the data, can be identified.  ...  A sequential tracing scheme ensures that all colluders are identified and disconnected from the system.  ...  A traitor is traced by examining the feedback sequence. When a traitor is found he is disconnected and tracing continuous for the next traitor until all traitors are found.  ... 
doi:10.1007/0-306-47791-2_16 fatcat:wniimsatorhc3lszshnmby37wa

Sequential and dynamic frameproof codes

Maura Paterson
2007 Designs, Codes and Cryptography  
The concept of traitor tracing has been applied to a digital broadcast setting in the form of dynamic traitor-tracing schemes and sequential traitor-tracing schemes, which could be used to combat piracy  ...  There are many schemes in the literature for protecting digital data from piracy by the use of digital fingerprinting, such as frameproof codes and traitor-tracing schemes.  ...  Sequential Frameproof Codes The aim of a sequential traitor tracing scheme is to distribute differently marked versions to the users in such a way that once the pirate broadcast is received a traitor can  ... 
doi:10.1007/s10623-006-9037-2 fatcat:bwv2dpgwprg65no2hch2jvr6rm

Page 6316 of Mathematical Reviews Vol. , Issue 2002H [page]

2002 Mathematical Reviews  
“We consider the same scenario as Fiat and Tassa and propose a new type of traceability scheme, called sequential traitor tracing, that can efficiently detect a// traitors and does not require any real-time  ...  {For the entire collection see MR 2002c:94002.} 2002h:94066 94A60 Safavi-Naini, Reihaneh (5-WLG-SIC; Wollongong); Wang, Yejing (5S-WLG-IC; Wollongong) Sequential traitor tracing.  ... 

Group testing meets traitor tracing

Peter Meerwald, Teddy Furon
2011 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
This paper links two a priori different topics, group testing and traitor tracing.  ...  State-of-the-art algorithms for traitor tracing, including the celebrated probabilistic Tardos code, are applied to the group testing problem.  ...  Traitor tracing An application of traitor tracing, a.k.a. passive fingerprinting, is the Video-on-Demand scenario where a movie is distributed to N users.  ... 
doi:10.1109/icassp.2011.5947280 dblp:conf/icassp/MeerwaldF11 fatcat:t5jcv55ybzh5ho6op3ilek2a34

Iterative single tardos decoder with controlled probability of false positive

Peter Meerwald, Teddy Furon
2011 2011 IEEE International Conference on Multimedia and Expo  
We propose a blind iterative single Tardos decoder for traitor tracing designed to catch as many colluders as possible while controlling the probability of accusing an innocent.  ...  This trick is used in the traitor tracing mechanism implemented in AACS, the standard for Blu-ray disc protection.  ...  Traitor tracing codes are designed such that its decoding algorithm recovers some of these c identifiers from their mixture.  ... 
doi:10.1109/icme.2011.6011836 dblp:conf/icmcs/MeerwaldF11 fatcat:nstiz4trrbdzjblkrqbd6ik6ky

Hybrid Traitor Tracing

Hongxia Jin, Jeffery Lotspiech
2006 2006 IEEE International Conference on Multimedia and Expo  
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials.  ...  The authors have been involved in what we believe is the first large-scale deployment of the tracing traitors approach.  ...  The traitor tracing schemes in [4, 5] are static and probabilistic. Sequential traitor tracing is presented in [6] .  ... 
doi:10.1109/icme.2006.262784 dblp:conf/icmcs/JinL06 fatcat:re3w6jcjwrgynezqq6v656sdga

Traitors Collaborating in Public: Pirates 2.0 [chapter]

Olivier Billet, Duong Hieu Phan
2009 Lecture Notes in Computer Science  
In this case, traitor tracing should allow the tracing of at least one of the traitors that took part in the coalition.  ...  Hence, bandwidth preservation in traitor tracing schemes is of crucial importance.  ...  Note that not all traitor tracing (or trace and revoke) schemes are susceptible to Pirates 2.0 attacks.  ... 
doi:10.1007/978-3-642-01001-9_11 fatcat:ra6ad3bmnfbc5hbmlwx5ym7zji

A Trade-off Traitor Tracing Scheme

Go OHTAKE, Kazuto OGAWA, Goichiro HANAOKA, Hideki IMAI
2009 IEICE transactions on information and systems  
Fiat and Tassa proposed the framework of dynamic traitor tracing.  ...  In this paper, we propose a new scheme that provides the advantages of dynamic traitor tracing schemes and also overcomes their problems.  ...  Sequential Traitor Tracing. Safavi-Naini and Wang proposed another approach to solve these problems, called sequential traitor tracing (STT) [18] , [19] .  ... 
doi:10.1587/transinf.e92.d.859 fatcat:jcfbnhs74vf3ln3ivxyxowqjoe

Applications of list decoding to tracing traitors

A. Silverberg, J. Staddon, J.L. Walker
2003 IEEE Transactions on Information Theory  
We compare the TA and IPP (identifiable parent property) traitor tracing algorithms, and give evidence that when using an algebraic structure, the ability to trace traitors with the IPP algorithm implies  ...  We produce schemes for which the TA (traceability) traitor tracing algorithm is very fast.  ...  Traitors can be searched for in sequences of expanding Hamming balls around the pirate. These searches can be run in parallel or sequentially.  ... 
doi:10.1109/tit.2003.810630 fatcat:p7zwver565hifban5ey7e247vi

Cost-effective Private Linear Key Agreement with Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors

Mriganka Mandal, Ratna Dutta
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
a sequential improvement of the PLKA based traitor tracing systems.  ...  We frame a traitor tracing algorithm with shorter running time which can be executed publicly.  ...  ., 2016) provide explicit construction of PLKA traitor tracing.  ... 
doi:10.5220/0006845505220529 dblp:conf/icete/MandalD18 fatcat:knj6hdwqvzewhpcg2x6ylkad7u

Message-Based Traitor Tracing with Optimal Ciphertext Rate [chapter]

Duong Hieu Phan, David Pointcheval, Mario Strefler
2012 Lecture Notes in Computer Science  
on the pirate decoder, one hopes to trace back one of the traitors who registered in the system.  ...  Traitor tracing is an important tool to discourage defrauders from illegally broadcasting multimedia content.  ...  Message-based traitor tracing.  ... 
doi:10.1007/978-3-642-33481-8_4 fatcat:4xnono7tqrbubgql5sstdje5s4

Efficient Traitor Tracing Algorithms Using List Decoding [chapter]

Alice Silverberg, Jessica Staddon, Judy L. Walker
2001 Lecture Notes in Computer Science  
We use powerful new techniques for list decoding errorcorrecting codes to efficiently trace traitors.  ...  We also construct schemes with an algorithm that finds all possible traitor coalitions faster than the IPP algorithm.  ...  Traitors can be searched for in sequences of expanding Hamming balls around the pirate. These searches can be run in parallel or sequentially.  ... 
doi:10.1007/3-540-45682-1_11 fatcat:nepsczcfpzctdd57r4stwlndpm

An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions [chapter]

Emmanouil Magkos, Panayiotis Kotzanikolaou, Vassilios Chrissikopoulos
2001 Lecture Notes in Computer Science  
Traceability schemes (also known as traitor tracing schemes) have been proposed as a method to establish copyright protection of broadcast information.  ...  They also describe a linear attack against the KD tracing algorithm [4] , where two or more traitors are able to construct a pirate decoder that cannot be traced back to them.  ...  identify at least one traitor.  ... 
doi:10.1007/3-540-44700-8_18 fatcat:tkvroyliljbf7knbnatsbeeffi
« Previous Showing results 1 — 15 out of 1,008 results