CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
On Crafty Pirates and Foxy Tracers
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Scalable public-key tracing and revoking
Proceedings of the twenty-second annual symposium on Principles of distributed computing
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Forgery attack to an asymptotically optimal traitor tracing scheme
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Public traceability in traitor tracing schemes
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Fully collusion resistant traitor tracing with short ciphertexts and private keys
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Hi-index | 0.00 |
Most traitor tracing schemes in the literature assume that pirate decoders are stateless. This stateless assumption, however, is unrealistic especially in case of hardware decoders. Any tracing algorithm based on the above assumption may draw a wrong detecting conclusion. The present approach converts a tracing algorithm for stateless decoder into a tracing algorithm for stateful decoder. By employing a robust watermarking scheme, the proposed approach ensures that tracing processes and normal broadcast processes are indistinguishable for pirate decoders. This in turn allows a tracer to incriminate at least one traitor from a pirate decoder. Since the communication overhead for conversion is merely linear to the number of traitors and independent of the number of users, our approach is more efficient than the techniques in [1].