Sequential traitor tracing

We consider a new type of traitor tracing scheme, called sequential traitor tracing, that protects against rebroadcasting of decrypted content. Sequential traceability (TA) schemes trace all up to c traitors and remove the shortcomings of dynamic tracing schemes. We give two general constructions and show the relationship between c-TA codes and sequential tracing schemes.

[1]  Amos Fiat,et al.  Dynamic Traitor Training , 1999, CRYPTO.

[2]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[3]  S. G. Vladut,et al.  Algebraic-Geometric Codes , 1991 .

[4]  Amos Fiat,et al.  Dynamic Traitor Tracing , 2001, Journal of Cryptology.

[5]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[6]  Douglas R. Stinson,et al.  Key Preassigned Traceability Schemes for Broadcast Encryption , 1998, Selected Areas in Cryptography.

[7]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[8]  Reihaneh Safavi-Naini,et al.  Collusion Secure q-ary Fingerprinting for Perceptual Content , 2001, Digital Rights Management Workshop.

[9]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[10]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[11]  Reihaneh Safavi-Naini,et al.  Sequential Traitor Tracing , 2000, CRYPTO.

[12]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[13]  Douglas R. Stinson,et al.  Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..

[14]  Jessica Staddon,et al.  Efficient Methods for Integrating Traceability and Broadcast Encryption , 1999, CRYPTO.

[15]  Amos Fiat,et al.  Broadcast Encryption , 1993, CRYPTO.

[16]  Jirí Sgall,et al.  Efficient dynamic traitor tracing , 2000, SODA '00.