DocumentCode :
1192732
Title :
Sequential traitor tracing
Author :
Safavi-Naini, Reihaneh ; Wang, Yejing
Author_Institution :
Sch. of Inf. Technol. & Comput. Sci., Univ. of Wollongong, NSW, Australia
Volume :
49
Issue :
5
fYear :
2003
fDate :
5/1/2003 12:00:00 AM
Firstpage :
1319
Lastpage :
1326
Abstract :
We consider a new type of traitor tracing scheme, called sequential traitor tracing, that protects against rebroadcasting of decrypted content. Sequential traceability (TA) schemes trace all up to c traitors and remove the shortcomings of dynamic tracing schemes. We give two general constructions and show the relationship between c-TA codes and sequential tracing schemes.
Keywords :
cryptography; error correction codes; watermarking; c-TA codes; decrypted content; error-correcting codes; fingerprinting; general constructions; rebroadcasting; sequential traceability schemes; sequential traitor tracing; Bandwidth; Cryptography; Data security; Decoding; Delay; Error correction codes; Fingerprint recognition; Protection; RAKE receivers; Watermarking;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2003.810629
Filename :
1197862
Link To Document :
بازگشت