loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Hongxia Jin 1 ; Jeffory Lotspiech 1 and Mario Blaum 2

Affiliations: 1 IBM Almaden Research Center, United States ; 2 Hitachi Global Storage Technologies, United States

ISBN: 978-972-8865-63-4

Keyword(s): Traitor tracing, error correcting code, traceability code.

Related Ontology Subjects/Areas/Topics: Coding Theory and Practice ; Cryptographic Techniques and Key Management ; Data Engineering ; Data Management and Quality ; Digital Rights Management ; Information and Systems Security

Abstract: In this paper we study the traitor tracing problem, which originates in attempting to combat piracy of copy-righted materials. When a pirated copy of the material is observed, a traitor tracing scheme should allow to identify at least one of the real subscribers (traitors) who participate in the construction of a pirated copy. In this paper, we focus on the pay-per-view type of subscription-based scenarios, in which materials are divided into multiple segments and each segment has multiple variations. We present a systematic way to assign the variations for each segment and for each subscriber using an error-correcting code. We give sufficient conditions for a code to be able to trace at least a traitor when faced with a coalition of m traitors. We also prove that these sufficient conditions are also necessary when the code is an MDS code.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.81.29.226

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Jin H.; Lotspiech J.; Blaum M. and (2006). TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 223-228. DOI: 10.5220/0002097202230228

@conference{secrypt06,
author={Hongxia Jin and Jeffory Lotspiech and Mario Blaum},
title={TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={223-228},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002097202230228},
isbn={978-972-8865-63-4},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS
SN - 978-972-8865-63-4
AU - Jin, H.
AU - Lotspiech, J.
AU - Blaum, M.
PY - 2006
SP - 223
EP - 228
DO - 10.5220/0002097202230228

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.