首页> 外文期刊>Journal of Cryptology >Low Bandwidth Dynamic Traitor Tracing Schemes
【24h】

Low Bandwidth Dynamic Traitor Tracing Schemes

机译:低带宽动态叛逃者跟踪方案

获取原文
获取原文并翻译 | 示例
       

摘要

Dynamic traitor tracing schemes were introduced by Fiat and Tassa in order to combat piracy in active broadcast scenarios. In such settings the data provider supplies access control keys to its legal customers on a periodical basis. A number of users may collude in order to publish those keys via the Internet or any other network. Dynamic traitor tracing schemes rely on the feedback from the pirate network in order to modify their key allocation until they are able either to incriminate and disconnect all traitors or force them to stop their illegal activity. Those schemes are deterministic in the sense that incrimination is always certain. As such deterministic schemes must multiply the critical data by at least p + 1, where p is the number of traitors, they may impose a too large toll on bandwidth. We suggest here probabilistic schemes that enable one to trace all traitors with almost certainty, where the critical data is multiplied by two, regardless of the number of traitors. These techniques are obtained by combining dynamic traitor tracing schemes with binary fingerprinting techniques, such as those proposed by Boneh and Shaw.
机译:菲亚特(Fiat)和塔萨(Tassa)引入了动态叛徒追踪方案,以打击活跃广播场景中的盗版行为。在这种设置下,数据提供者会定期向其合法客户提供访问控制密钥。为了通过互联网或任何其他网络发布那些密钥,许多用户可能会串通在一起。动态叛徒追踪方案依靠盗版网络的反馈来修改其密钥分配,直到它们能够使所有叛徒罪名成立或与之脱节或迫使他们停止其非法活动为止。从罪犯总是一定的意义上说,这些方案是确定性的。由于这种确定性方案必须将关键数据至少乘以p + 1,其中p是叛徒的数目,因此它们可能会给带宽带来太大的损失。我们在这里建议一种概率方案,使人们几乎可以确定地追踪所有叛徒,其中关键数据乘以2,而不管叛徒的数量如何。这些技术是通过将动态叛徒追踪方案与二进制指纹技术(例如Boneh和Shaw提出的技术)相结合而获得的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号