TY - JOUR
T1 - Low bandwidth dynamic traitor tracing schemes
AU - Tassa, Tamir
PY - 2005/4
Y1 - 2005/4
N2 - Dynamic traitor tracing schemes were introduced by Fiat and Tassa in order to combat piracy in active broadcast scenarios. In such settings the data provider supplies access control keys to its legal customers on a periodical basis. A number of users may collude in order to publish those keys via the Internet or any other network. Dynamic traitor tracing schemes rely on the feedback from the pirate network in order to modify their key allocation until they are able either to incriminate and disconnect all traitors or force them to stop their illegal activity. Those schemes are deterministic in the sense that incrimination is always certain. As such deterministic schemes must multiply the critical data by at least p + 1, where p is the number of traitors, they may impose a too large toll on bandwidth. We suggest here probabilistic schemes that enable one to trace all traitors with almost certainty, where the critical data is multiplied by two, regardless of the number of traitors. These techniques are obtained by combining dynamic traitor tracing schemes with binary fingerprinting techniques, such as those proposed by Boneh and Shaw.
AB - Dynamic traitor tracing schemes were introduced by Fiat and Tassa in order to combat piracy in active broadcast scenarios. In such settings the data provider supplies access control keys to its legal customers on a periodical basis. A number of users may collude in order to publish those keys via the Internet or any other network. Dynamic traitor tracing schemes rely on the feedback from the pirate network in order to modify their key allocation until they are able either to incriminate and disconnect all traitors or force them to stop their illegal activity. Those schemes are deterministic in the sense that incrimination is always certain. As such deterministic schemes must multiply the critical data by at least p + 1, where p is the number of traitors, they may impose a too large toll on bandwidth. We suggest here probabilistic schemes that enable one to trace all traitors with almost certainty, where the critical data is multiplied by two, regardless of the number of traitors. These techniques are obtained by combining dynamic traitor tracing schemes with binary fingerprinting techniques, such as those proposed by Boneh and Shaw.
KW - Binary codes
KW - Broadcast encryption
KW - Fingerprinting
KW - On-line algorithms
KW - Pay-TV
KW - Traitor tracing
KW - Watermarking
UR - http://www.scopus.com/inward/record.url?scp=17444400933&partnerID=8YFLogxK
U2 - 10.1007/s00145-004-0214-z
DO - 10.1007/s00145-004-0214-z
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:17444400933
SN - 0933-2790
VL - 18
SP - 167
EP - 183
JO - Journal of Cryptology
JF - Journal of Cryptology
IS - 2
ER -