traitor tracing schemes
Recently Published Documents


TOTAL DOCUMENTS

23
(FIVE YEARS 0)

H-INDEX

8
(FIVE YEARS 0)

2018 ◽  
Vol 3 (2) ◽  
pp. 41
Author(s):  
Antonius Cahya Prihandoko

This paper provides a review on traitor tracing schemes that are developed to counter piracy strategies. The review starts with a formal definition of the traitor tracing schemes. The paper is then outlined based on two main strategies which may taken by digital content pirates. Mostly the pirates have strategy to make use leaked decryption key or leaked decrypted content. For each piracy strategy, we presents traitor tracing schemes that can be used to counter the piracy. We also analysis strength and weakness of each group of the schemes. At the end of this paper, we propose to combine some schemes for better protection.   


2015 ◽  
Vol 61 (7) ◽  
pp. 3882-3900 ◽  
Author(s):  
Jan-Jaap Oosterwijk ◽  
Boris Skoric ◽  
Jeroen Doumen

2014 ◽  
Vol 543-547 ◽  
pp. 3300-3307 ◽  
Author(s):  
Xing Wen Zhao ◽  
Gao Fei Zhao ◽  
Hui Li

In broadcast encryption system certain users may leak their decryption keys to build pirate decoders, so traitor tracing is quite necessary. There exist many codes based traitor tracing schemes. As pointed out by Billet and Phan in ICITS 2008, these schemes lack revocation ability. The ability of revocation can disable identified malicious users and users who fail to fulfill the payments, so that the broadcast encryption system can be more practical. Recently, Zhao and Li presented a construction of codes based tracing and revoking scheme which achieves user revocation as well as traitor tracing. However, their scheme is only secure against chosen plaintext attacks under selective-adversary model with random oracle. In this paper, we obtain a new construction of codes based tracing and revoking scheme which is proved secure against chosen ciphertext attacks under adaptive-adversary model without random oracle. Our idea is to insert codeword into Boneh and Hamburgs identity based broadcast encryption scheme to retain the ability of user revocation and use Boneh and Naors method to trace traitors. Our fully secure scheme is roughly as efficient as Zhao and Lis scheme while the security is enhanced.


2014 ◽  
Author(s):  
Jan-Jaap Oosterwijk ◽  
Jeroen Doumen ◽  
Thijs Laarhoven

2013 ◽  
Vol 59 (7) ◽  
pp. 4230-4242 ◽  
Author(s):  
T. Laarhoven ◽  
J. Doumen ◽  
P. Roelse ◽  
B. Skoric ◽  
B. de Weger

Sign in / Sign up

Export Citation Format

Share Document