A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Sequential Traitor Tracing
[chapter]
2000
Lecture Notes in Computer Science
We consider the same scenario as Fiat and Tassa and propose a new type of traceability scheme, called sequential traitor tracing, that can efficiently detect all traitors and does not require any real-time ...
Fiat and Tassa proposed dynamic traitor tracing schemes that can detect all traitors if they attempt to rebroadcast the content after it is decrypted. ...
Sequential Traitor Tracing One of the main drawbacks of FT model is the high real-time computation required for allocation of marks for each segment. ...
doi:10.1007/3-540-44598-6_20
fatcat:4gzldvcfkneqnjk4a2z2jhdbs4
Sequential traitor tracing
2003
IEEE Transactions on Information Theory
We consider a new type of traitor tracing scheme, called sequential traitor tracing, that protects against rebroadcasting of decrypted content. ...
Abstract-We consider a new type of traitor tracing scheme, called sequential traitor tracing, that protects against rebroadcasting of decrypted content. ...
We call the system sequential traitor tracing scheme to emphasise the fact that the traitors are identified sequentially, that is, when a colluder is found he is disconnected and the system proceeds to ...
doi:10.1109/tit.2003.810629
fatcat:gtxdxxz42zdsxandeus4dfyjxi
A Code for Sequential Traitor Tracing
[chapter]
The International Series in Engineering and Computer Science
Traitor tracing schemes ensure that at least one of the at most c colluders who construct a pirate decoder 1 to illegally access the data, can be identified. ...
A sequential tracing scheme ensures that all colluders are identified and disconnected from the system. ...
A traitor is traced by examining the feedback sequence. When a traitor is found he is disconnected and tracing continuous for the next traitor until all traitors are found. ...
doi:10.1007/0-306-47791-2_16
fatcat:wniimsatorhc3lszshnmby37wa
Sequential and dynamic frameproof codes
2007
Designs, Codes and Cryptography
The concept of traitor tracing has been applied to a digital broadcast setting in the form of dynamic traitor-tracing schemes and sequential traitor-tracing schemes, which could be used to combat piracy ...
There are many schemes in the literature for protecting digital data from piracy by the use of digital fingerprinting, such as frameproof codes and traitor-tracing schemes. ...
Sequential Frameproof Codes The aim of a sequential traitor tracing scheme is to distribute differently marked versions to the users in such a way that once the pirate broadcast is received a traitor can ...
doi:10.1007/s10623-006-9037-2
fatcat:bwv2dpgwprg65no2hch2jvr6rm
Page 6316 of Mathematical Reviews Vol. , Issue 2002H
[page]
2002
Mathematical Reviews
“We consider the same scenario as Fiat and Tassa and propose a new type of traceability scheme, called sequential traitor tracing, that can efficiently detect a// traitors and does not require any real-time ...
{For the entire collection see MR 2002c:94002.}
2002h:94066 94A60 Safavi-Naini, Reihaneh (5-WLG-SIC; Wollongong); Wang, Yejing (5S-WLG-IC; Wollongong) Sequential traitor tracing. ...
Group testing meets traitor tracing
2011
2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
This paper links two a priori different topics, group testing and traitor tracing. ...
State-of-the-art algorithms for traitor tracing, including the celebrated probabilistic Tardos code, are applied to the group testing problem. ...
Traitor tracing An application of traitor tracing, a.k.a. passive fingerprinting, is the Video-on-Demand scenario where a movie is distributed to N users. ...
doi:10.1109/icassp.2011.5947280
dblp:conf/icassp/MeerwaldF11
fatcat:t5jcv55ybzh5ho6op3ilek2a34
Iterative single tardos decoder with controlled probability of false positive
2011
2011 IEEE International Conference on Multimedia and Expo
We propose a blind iterative single Tardos decoder for traitor tracing designed to catch as many colluders as possible while controlling the probability of accusing an innocent. ...
This trick is used in the traitor tracing mechanism implemented in AACS, the standard for Blu-ray disc protection. ...
Traitor tracing codes are designed such that its decoding algorithm recovers some of these c identifiers from their mixture. ...
doi:10.1109/icme.2011.6011836
dblp:conf/icmcs/MeerwaldF11
fatcat:nstiz4trrbdzjblkrqbd6ik6ky
Hybrid Traitor Tracing
2006
2006 IEEE International Conference on Multimedia and Expo
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. ...
The authors have been involved in what we believe is the first large-scale deployment of the tracing traitors approach. ...
The traitor tracing schemes in [4, 5] are static and probabilistic. Sequential traitor tracing is presented in [6] . ...
doi:10.1109/icme.2006.262784
dblp:conf/icmcs/JinL06
fatcat:re3w6jcjwrgynezqq6v656sdga
Traitors Collaborating in Public: Pirates 2.0
[chapter]
2009
Lecture Notes in Computer Science
In this case, traitor tracing should allow the tracing of at least one of the traitors that took part in the coalition. ...
Hence, bandwidth preservation in traitor tracing schemes is of crucial importance. ...
Note that not all traitor tracing (or trace and revoke) schemes are susceptible to Pirates 2.0 attacks. ...
doi:10.1007/978-3-642-01001-9_11
fatcat:ra6ad3bmnfbc5hbmlwx5ym7zji
A Trade-off Traitor Tracing Scheme
2009
IEICE transactions on information and systems
Fiat and Tassa proposed the framework of dynamic traitor tracing. ...
In this paper, we propose a new scheme that provides the advantages of dynamic traitor tracing schemes and also overcomes their problems. ...
Sequential Traitor Tracing. Safavi-Naini and Wang proposed another approach to solve these problems, called sequential traitor tracing (STT) [18] , [19] . ...
doi:10.1587/transinf.e92.d.859
fatcat:jcfbnhs74vf3ln3ivxyxowqjoe
Applications of list decoding to tracing traitors
2003
IEEE Transactions on Information Theory
We compare the TA and IPP (identifiable parent property) traitor tracing algorithms, and give evidence that when using an algebraic structure, the ability to trace traitors with the IPP algorithm implies ...
We produce schemes for which the TA (traceability) traitor tracing algorithm is very fast. ...
Traitors can be searched for in sequences of expanding Hamming balls around the pirate. These searches can be run in parallel or sequentially. ...
doi:10.1109/tit.2003.810630
fatcat:p7zwver565hifban5ey7e247vi
Cost-effective Private Linear Key Agreement with Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors
2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications
a sequential improvement of the PLKA based traitor tracing systems. ...
We frame a traitor tracing algorithm with shorter running time which can be executed publicly. ...
., 2016) provide explicit construction of PLKA traitor tracing. ...
doi:10.5220/0006845505220529
dblp:conf/icete/MandalD18
fatcat:knj6hdwqvzewhpcg2x6ylkad7u
Message-Based Traitor Tracing with Optimal Ciphertext Rate
[chapter]
2012
Lecture Notes in Computer Science
on the pirate decoder, one hopes to trace back one of the traitors who registered in the system. ...
Traitor tracing is an important tool to discourage defrauders from illegally broadcasting multimedia content. ...
Message-based traitor tracing. ...
doi:10.1007/978-3-642-33481-8_4
fatcat:4xnono7tqrbubgql5sstdje5s4
Efficient Traitor Tracing Algorithms Using List Decoding
[chapter]
2001
Lecture Notes in Computer Science
We use powerful new techniques for list decoding errorcorrecting codes to efficiently trace traitors. ...
We also construct schemes with an algorithm that finds all possible traitor coalitions faster than the IPP algorithm. ...
Traitors can be searched for in sequences of expanding Hamming balls around the pirate. These searches can be run in parallel or sequentially. ...
doi:10.1007/3-540-45682-1_11
fatcat:nepsczcfpzctdd57r4stwlndpm
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions
[chapter]
2001
Lecture Notes in Computer Science
Traceability schemes (also known as traitor tracing schemes) have been proposed as a method to establish copyright protection of broadcast information. ...
They also describe a linear attack against the KD tracing algorithm [4] , where two or more traitors are able to construct a pirate decoder that cannot be traced back to them. ...
identify at least one traitor. ...
doi:10.1007/3-540-44700-8_18
fatcat:tkvroyliljbf7knbnatsbeeffi
« Previous
Showing results 1 — 15 out of 1,008 results