Dynamic traitor tracing

Research output: Contribution to journalArticlepeer-review

Abstract

Traitor tracing schemes were introduced to combat the typical piracy scenario whereby pirate decoders (or access control smartcards) are manufactured and sold by pirates to illegal subscribers. Those traitor tracing schemes, however, are ineffective for the currently less common scenario where a pirate publishes the periodical access control keys on the Internet or, alternatively, simply rebroadcasts the content via an independent pirate network. This new piracy scenario may become especially attractive (to pirates) in the context of broadband multicast over the Internet. In this paper we consider the consequences of this type of piracy and offer countermeasures. We introduce the concept of dynamic traitor tracing which is a practical and efficient tool to combat this type of piracy.

Original languageEnglish
Pages (from-to)211-223
Number of pages13
JournalJournal of Cryptology
Volume14
Issue number3
DOIs
StatePublished - 2001

Keywords

  • Broadcast
  • Encryption
  • Imprinting
  • On-line algorithms
  • Pay tv
  • Traitor tracing
  • Watermarking

Fingerprint

Dive into the research topics of 'Dynamic traitor tracing'. Together they form a unique fingerprint.

Cite this