Dynamic traitor tracing

Amos Fiat, Tamir Tassa

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Traitor tracing schemes were introduced so as to combat the typical piracy scenario whereby pirate decoders (or access control smart-cards) are manufactured and sold by pirates to illegal subscribers. Those traitor tracing schemes, however, are ineffective for the currently less common scenario where a pirate publishes the periodical access control keys on the Internet or, alternatively, simply rebroadcasts the content via an independent pirate network. This new piracy scenario may become especially attractive (to pirates) in the context of broadband multicast over the Internet. In this paper we consider the consequences of this type of piracy and offer countermeasures. We introduce the concept of dynamic traitor tracing which is a practical and efficient tool to combat this type of piracy. We also consider the static watermarking problem, presented by Boneh and Shaw, and derive bounds on the performance parameters of the “natural majority algorithm"”.

Original languageEnglish
Title of host publicationAdvances in Cryptology – CRYPTO 1999 - 19th Annual International Cryptology Conference, Proceedings
EditorsMichael Wiener
PublisherSpringer Verlag
Pages354-371
Number of pages18
ISBN (Print)3540663479, 9783540663478
DOIs
StatePublished - 1999
Event19th Annual International Cryptology Conference, CRYPTO 1999 - Santa Barbara, United States
Duration: 15 Aug 199919 Aug 1999

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1666
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference19th Annual International Cryptology Conference, CRYPTO 1999
Country/TerritoryUnited States
CitySanta Barbara
Period15/08/9919/08/99

Fingerprint

Dive into the research topics of 'Dynamic traitor tracing'. Together they form a unique fingerprint.

Cite this