TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS

Hongxia Jin, Jeffory Lotspiech, Mario Blaum

2006

Abstract

In this paper we study the traitor tracing problem, which originates in attempting to combat piracy of copy-righted materials. When a pirated copy of the material is observed, a traitor tracing scheme should allow to identify at least one of the real subscribers (traitors) who participate in the construction of a pirated copy. In this paper, we focus on the pay-per-view type of subscription-based scenarios, in which materials are divided into multiple segments and each segment has multiple variations. We present a systematic way to assign the variations for each segment and for each subscriber using an error-correcting code. We give sufficient conditions for a code to be able to trace at least a traitor when faced with a coalition of m traitors. We also prove that these sufficient conditions are also necessary when the code is an MDS code.

References

  1. A. Barg, R. B. and Kabatiansky, G. (2003). Digital fingerprinting codes: Problem statements, constructions, identification of traitors. In IEEE Transactions on Information Theory, volume 49, pages 852-865.
  2. B.Chor, A. Fiat, M. N., and Pinkas, B. (2000). Tracing traitors. In IEEE Transactions on Information Theory, volume 46, pages 893-910.
  3. Boneh, D. and Shaw, J. (1998). Collusion-secure fingerprinting for digital data. In IEEE Trans. on Information Theory, volume 44, No.5, pages 1897-1905.
  4. Chor, B., Fiat, A., and Naor, M. (1994). Tracing traitors. In Crypto 1994, Lecture Notes in computer science, volume 839, pages 480-491.
  5. Fiat, A. and Naor, M. (1993). Broadcast encryption. In Crypto 1993, Lecture Notes in computer science, volume 773, pages 480-491.
  6. Fiat, A. and Tassa, T. (1999). Dynamic traitor tracing. In Crypto 1999, Lecture Notes in computer science, volume 1666, pages 354-371.
  7. I. Cox, J. Killian, T. L. and Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia,. In IEEE Transactions on Imaging Processing, volume 6(12), pages 1673-1687.
  8. J. N. Staddon, D. S. and Wei, R. (2001). Combinatorial properties of frameproof and traceability codes. In IEEE Transactions on Information Theory, volume 47, pages 1042-1049.
  9. Safani-Naini, R. and Wang, Y. (2003). Sequential traitor tracing. In IEEE Transactions on Information Theory, volume 49, No.5, pages 1319-1326.
  10. Trung, T. V. and Martirosyan, S. (2004). On a class of traceability codes. In Design, Codes and Cryptography, volume 31(2), pages 125-132.
Download


Paper Citation


in Harvard Style

Jin H., Lotspiech J. and Blaum M. (2006). TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 223-228. DOI: 10.5220/0002097202230228


in Bibtex Style

@conference{secrypt06,
author={Hongxia Jin and Jeffory Lotspiech and Mario Blaum},
title={TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={223-228},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002097202230228},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS
SN - 978-972-8865-63-4
AU - Jin H.
AU - Lotspiech J.
AU - Blaum M.
PY - 2006
SP - 223
EP - 228
DO - 10.5220/0002097202230228