Paper 10

TRAITOR TRACING SCHEME TO COUNTER PIRACY STRATEGIES

Antonius Cahya Prihandoko, Hossein Ghodosi, Bruce Litow

Abstract.

We study traitor tracing schemes in the context of Digital Rights Management (DRM) in content distribution systems. Traitor tracing scheme is a copyright infringement detection system which works by tracing the source of leaked information. To be effective, a traitor tracing scheme has to be designed  according to the piracy strategy that it aims to counter. Naturally, there are two strategies that are likely used by the traitors to facilitate illegal access to the
encrypted content. Firstly, the traitors may attempt to extract the decryption keys to construct a pirate decoder. Secondly, they may legally decrypt the content and then illegally redistribute the decrypted content for their own benefits. We propose a traitor tracing scheme to counter both piracy strategies. The scheme is intended to deter these kinds of piracy. However, if a pirate decoder or copy of content is discovered, the traitor detection mechanism can identify the guilty user without incriminating innocent users. Thus, our scheme preserves security for the content provider and privacy for the users in the traitor tracing context.

Keywords: Digital Rights Management, Traitor Tracing Schemes, Piracy Strategies.

This paper was submitted to the 7th International Conference on Information Theoretic Security, Singapore.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s