Font Size: a A A

Research On Traitor Tracing Scheme

Posted on:2007-08-17Degree:MasterType:Thesis
Country:ChinaCandidate:B ZhouFull Text:PDF
GTID:2178360215997670Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The fast development of computer networks facilitates the distribution of digital contents such as music and video. How to protect the copyrights of digital contents and protect privacy is a big challenge and receives a lot of attentions. Traitor tracing schemes are very important measures for digital copyright protection. Usually, Data Suppliers often face two kinds of representative threats: key-collusion attack and content-collusion attack. Accordingly, there are two types of traitor tracing schemes that against either key-collusion attack or against content-collusion attack.Based on the study and analysis of the traitor tracing schemes in depth, this thesis proposes a novel traiter tracing scheme based on error correction code that is capable to resist against key-collusion attack. It is open and deterministically-tracing, and compared with previous proposed schemes, it outperforms in the overhead of communication and key size, with 8 k logN blocks and 2k keys for each blocks.The main content of the paper contains in the following:(1)Expatiate the backgrounds, research state of art, concepts and basic structure of traitor tracing schemes.(2)Describe two kinds of traitor tracing schemes against key-collusion attack i.e. private key traitor tracing schemes(symmetric traitor tracing schemes) and public key traitor tracing schemes(asymmetric traitor tracing schemes) in detail, and analyze their performance in depth.(3)Describe two kinds of traitor tracing schemes against content-collusion attack i.e. dynamic traitor tracing scheme and sequential traitor tracing scheme in detail, and analyze their performance in depth.(4)Based on the basic structure of traitor tracing schemes and error correcting code, the thesis present an ECC-based traitor tracing scheme, that is capable of resilient against coalitions of at most k corrupt users.
Keywords/Search Tags:digital copyright protection, traitor tracing, key-collusion attack, content-collusion attack
PDF Full Text Request
Related items