Presentation | 2004-09-17 Trade-off Traitor Tracing Goichiro HANAOKA, Kazuto OGAWA, Arisa FUJII, Go OHTAKE, Keigo MAJIMA, Kimiyuki OYAMADA, Hideki IMAI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Copyright is a legal construct used to protect intellectual property for the purpose of commerce and is a necessary factor for constructing a system of secure content distribution. Leakage of user's secret information, in particular, can be used as formidable means of attack and there have been wide ranges of discussion on the counter-measures and the necessary steps to cope with piracy in digital content distribution systems. For instance, Traitor Tracing Schemes are a very useful tool for preventing mal-distribution of content decryption key which identifies the origin of the leaked data. However, former traitor tracing schemes are ineffective for the situation where the content itself is re-distributed and the pirate cannot be specified. As a solution to overcome this problem, Fiat and Tassa proposed a framework of Dynamic Traitor Tracing Schemes, however, their scheme required dynamic computation transactions according to the responses of the pirate and hence was inefficient for a large-scale communication system. Moreover, it also presumes real-time observation of content re-distribution and therefore cannot be simply utilized in application where such an assumption is not valid. In this paper, we propose a new method which provides the advantage of dynamic traitor tracing schemes and also overcomes these problems. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | (Dynamic) Traitor tracing / Digital watermark |
Paper # | ISEC2004-73 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2004/9/10(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Trade-off Traitor Tracing |
Sub Title (in English) | |
Keyword(1) | (Dynamic) Traitor tracing |
Keyword(2) | Digital watermark |
1st Author's Name | Goichiro HANAOKA |
1st Author's Affiliation | Institute of Industrial Science, University of Tokyo:Reseach Fellow of Japan Society of the Promotion of Science() |
2nd Author's Name | Kazuto OGAWA |
2nd Author's Affiliation | STRL, NHK |
3rd Author's Name | Arisa FUJII |
3rd Author's Affiliation | STRL, NHK |
4th Author's Name | Go OHTAKE |
4th Author's Affiliation | STRL, NHK |
5th Author's Name | Keigo MAJIMA |
5th Author's Affiliation | STRL, NHK |
6th Author's Name | Kimiyuki OYAMADA |
6th Author's Affiliation | STRL, NHK |
7th Author's Name | Hideki IMAI |
7th Author's Affiliation | Institute of Industrial Science, University of Tokyo |
Date | 2004-09-17 |
Paper # | ISEC2004-73 |
Volume (vol) | vol.104 |
Number (no) | 315 |
Page | pp.pp.- |
#Pages | 7 |
Date of Issue |