We assume that our encryption scheme is difficult to break.2) Created by breaking the underlying encryption.1) Created by obtaining keys from legitimate users.Pirate Decoder: Device used by the pirates to decrypt our encrypted broadcasts.Traitor (Pirate): Professor Itkis and his friends.This is the basic idea of Traitor Tracing.The Goal: After confiscating this device, how do we figure out who supplied the keys which decrypt our broadcasts.Suppose Professor Itkis is a subscriber who with other subscribers designs a device which will allow people to view our broadcasts without paying. We only want to broadcast to legal subscribers (all of which have a special decrypting key). Motivation We want to trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. We then analyze the efficiency of each method.Next, we introduce two methods to solve this problem.First, we motivate and introduce the General Traitor Tracing problem that we want to solve.Traitor Tracing Papers Benny Chor, Amos Fiat and Moni Naor, Tracing Traitors (1994) Moni Naor and Benny Pinkas, Threshold Traitor Tracing (1998) Presented By: Anukool Lakhina, Keren Pinkas and Scott Savarese
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |