DocumentCode
692786
Title
Deterring traitor using double encryption scheme
Author
Prihandoko, Antonius Cahya ; Ghodosi, Hossein ; Litow, Bruce
Author_Institution
Sch. of Bus. (IT), James Cook Univ., Townsville, QLD, Australia
fYear
2013
fDate
3-4 Dec. 2013
Firstpage
100
Lastpage
104
Abstract
Traitor is a legitimate user in a content distribution system who facilitates illegal content access to unauthorized party. Naturally, there are two strategies that are likely used by the traitors to do violations. Firstly, the traitors may attempt to extract the decryption keys to construct a pirate decoder. Secondly, they may legally decrypt the content and then illegally redistribute the decrypted content for their own benefits. We propose a content protection scheme to deter both piracy strategies. However, if a pirate decoder or content is discovered, the scheme is still able to identify the real traitors without incriminating innocent users. Thus, our scheme preserves security for the content provider and privacy for the users in the traitor tracing context.
Keywords
content management; cryptography; data protection; information retrieval; law administration; content decryption; content distribution system; content privacy; content protection scheme; content provider; decryption key extraction; double encryption scheme; illegal content access; illegal decrypted content redistribution; pirate decoder; traitor tracing; unauthorized party; Decoding; Encryption; Smart cards; Watermarking; Content Distribution System; Piracy Strategies; Privacy; Security; Traitor Tracing Schemes;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication, Networks and Satellite (COMNETSAT), 2013 IEEE International Conference on
Conference_Location
Yogyakarta
Type
conf
DOI
10.1109/COMNETSAT.2013.6870869
Filename
6870869
Link To Document