loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Author: Hongxia Jin

Affiliation: IBM Almaden Research Center, United States

ISBN: 978-989-8111-12-8

Keyword(s): Content Protection, Broadcast Encryption, Traitor Tracing, Anti-piracy.

Related Ontology Subjects/Areas/Topics: Data Engineering ; Data Management and Quality ; Digital Rights Management ; Information and Systems Security

Abstract: In this paper we take a closer look at broadcast encryption and traitor tracing in the context of content protection. In current state-of-art, these are viewed as two separate and orthogonal problems. In this paper we challenge this separation. We presented example that shows it can be insecure if a broadcast encryption scheme offers no traceability. We also show it is insufficient to have a traitor tracing scheme that does not have revocation capability and does not support multi-time tracing. Furthermore we show supporting multi-time tracing may actually mean a traitor tracing scheme also needs to have broadcast capability. We hope the evidences we presented in this paper can raise the awareness of the connections between these two problems and shed new insights on future research directions in this important area.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.208.187.169

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Jin H. and (2007). A CLOSER LOOK AT BROADCAST ENCRYPTION AND TRAITOR TRACING FOR CONTENT PROTECTION.In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 295-298. DOI: 10.5220/0002128502950298

@conference{secrypt07,
author={Hongxia Jin},
title={A CLOSER LOOK AT BROADCAST ENCRYPTION AND TRAITOR TRACING FOR CONTENT PROTECTION},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={295-298},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002128502950298},
isbn={978-989-8111-12-8},
}

TY - CONF

JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - A CLOSER LOOK AT BROADCAST ENCRYPTION AND TRAITOR TRACING FOR CONTENT PROTECTION
SN - 978-989-8111-12-8
AU - Jin, H.
PY - 2007
SP - 295
EP - 298
DO - 10.5220/0002128502950298

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.