Loading...
Loading...

Go to the content (press return)

Tracing traitors by guessing secrets. The q-ary case

Author
Fernandez, M.; Soriano, M.; Cotrina, J.
Type of activity
Presentation of work at congresses
Name of edition
1st Information Security Practice and Experience Conference
Date of publication
2005
Presentation's date
2005
Book of congress proceedings
Information security practice and experience: First International Conference, ISPEC 2005: Singapore, April 11-14, 2005: proceedings
First page
61
Last page
73
Publisher
Springer
DOI
https://doi.org/10.1007/978-3-540-31979-5_6 Open in new window
Repository
http://hdl.handle.net/2117/23120 Open in new window
URL
http://link.springer.com/chapter/10.1007%2F978-3-540-31979-5_6 Open in new window
Abstract
In this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential traitor tracing schemes are used to detect piracy in multimedia content broadcast systems, where the traitors illegally rebroadcast the content they receive to unauthorized users.
Citation
Fernandez, M.; Soriano, M.; Cotrina, J. Tracing traitors by guessing secrets. The q-ary case. A: Information Security Practice and Experience Conference. "Information security practice and experience: First International Conference, ISPEC 2005: Singapore, April 11-14, 2005: proceedings". Singapore: Springer, 2005, p. 61-73.
Keywords
Computer Communication Networks, Computers and Society, Data Encryption, Information Storage and Retrieval, Management of Computing and Information Systems, Operating Systems
Group of research
ISG - Information Security Group
WNG - Wireless Networks Group

Participants