Paper 11


Antonius Cahya Prihandoko, Hossein Ghodosi, Bruce Litow


Traitor is a legitimate user in a content distribution system who facilitates illegal content access to unauthorized party. Naturally, there are two strategies that are likely used by the traitors to do violations. Firstly, the traitors may attempt to extract the decryption keys to construct a pirate decoder. Secondly, they may legally decrypt the content and then illegally redistribute the decrypted content for their own benefits. We
propose a content protection scheme to deter both piracy strategies. However, if a pirate decoder or content is discovered, the scheme is still able to identify the real traitors without incriminating innocent users. Thus, our scheme preserves security for the content provider and privacy for the users in the traitor tracing context.

Keywords: Content Distribution System, Traitor Tracing Schemes, Piracy Strategies, Security, Privacy.

Presented at the IEEE International Conference on Communication, Network and Satelite (COMNETSAT) 2013, 3-4 December 2013, Yogyakarta – Indonesia, and appeared in its proceedings on page 100-104, ISBN 978-1-4673-6054-8.

This paper has been published at IEEE Xplore Digital Library

and archived at ResearchOnline@JCU



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s