Title :
Traitor Tracing and Revocation Mechanisms with Privacy-Preserving
Author :
Ding, Yi ; Fan, Lei
Author_Institution :
Sch. of Inf. Security Eng., Shanghai Jiao Tong Univ., Shanghai, China
Abstract :
Content distribution systems are vulnerable to the attack of rebroadcasting: pirate publishes the content or the decoding key in violation of the licensing agreement. Traitor tracing and revocation mechanisms can trace the traitors and revoke malicious users. We argue that privacy is another important feature in digital rights management technologies, and the proper balance between DRM and user privacy is an important question in its own right. Our scheme adds this important privacy-preserving feature into the existing content distribution system, and with the help of a trusted third party it can efficiently trace and revoke the pirate users while still preserve the privacy of honest users.
Keywords :
data privacy; digital rights management; content distribution systems; digital rights management technologies; privacy-preserving feature; rebroadcasting attack; revocation mechanisms; traitor tracing; trusted third party; Decoding; Educational institutions; Encryption; Privacy; blind signature; digital rights management; privacy; traitor tracing;
Conference_Titel :
Computational Intelligence and Security (CIS), 2011 Seventh International Conference on
Conference_Location :
Hainan
Print_ISBN :
978-1-4577-2008-6
DOI :
10.1109/CIS.2011.190