Title :
Sequential traitor tracing
Author :
Safavi-Naini, Reihaneh ; Wang, Yejing
Author_Institution :
Sch. of Inf. Technol. & Comput. Sci., Univ. of Wollongong, NSW, Australia
fDate :
5/1/2003 12:00:00 AM
Abstract :
We consider a new type of traitor tracing scheme, called sequential traitor tracing, that protects against rebroadcasting of decrypted content. Sequential traceability (TA) schemes trace all up to c traitors and remove the shortcomings of dynamic tracing schemes. We give two general constructions and show the relationship between c-TA codes and sequential tracing schemes.
Keywords :
cryptography; error correction codes; watermarking; c-TA codes; decrypted content; error-correcting codes; fingerprinting; general constructions; rebroadcasting; sequential traceability schemes; sequential traitor tracing; Bandwidth; Cryptography; Data security; Decoding; Delay; Error correction codes; Fingerprint recognition; Protection; RAKE receivers; Watermarking;
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.2003.810629