Adaptive traitor tracing with Bayesian networks

  • Authors:
  • Philip Zigoris;Hongxia Jin

  • Affiliations:
  • Department of Computer Science, University of California, Santa Cruz, Santa Cruz, California;Content Protection Group, IBM Almaden Research Center, San Jose, California

  • Venue:
  • IAAI'07 Proceedings of the 19th national conference on Innovative applications of artificial intelligence - Volume 2
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The practical success of broadcast encryption hinges on the ability to (1) revoke the access of compromised keys and (2) determine which keys have been compromised. In this work we focus on the latter, the so-called traitor tracing problem. We present an adaptive tracing algorithm that selects forensic tests according to the information gain criteria. The results of the tests refine an explicit, Bayesian model of our beliefs that certain keys are compromised. In choosing tests based on this criteria, we significantly reduce the number of tests, as compared to the state-of-the-art techniques, required to identify compromised keys. As part of the work we developed an efficient, distributable inference algorithm that is suitable for our application and also give an efficient heuristic for choosing the optimal test.