Font Size: a A A

Research On Traitor Tracing

Posted on:2007-03-17Degree:MasterType:Thesis
Country:ChinaCandidate:W F YangFull Text:PDF
GTID:2178360182477867Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With rapid development of E-business, more and more attention is paid to the copyright protection of digital contents. Different ways are used to protect digital copyright for different digital contents. Traitor tracing schemes are designed to trace piracy back to its original source once it has been detected in a broadcast/network environment, so that the content provider has some means of recourse against piracy. In practice, traitor tracing schemes and broadcast encryption schemes can be effectively combined in order to minimize the damage as the result of piracy. Traitor tracing technology not only provides a new digital copyright protection mechanism for broadcast information, but also promotes the development of the existing copyright protection technologies.What follows are the main achievements of this thesis:Introduce the state of digital copyright protection in detail.Introduce the related theories and technologies of traitor tracing.Provide a brief survey of the state of traitor tracing technology .A uniform analysis of the major work in this area is presented and comparisons are made between the competing schemes. Such comparisons are based on performance benchmarks such as the memory and computation requirements of the both content supplier and users as well as the broadcast overhead involved.Propose an NTRU cryptosystem based traitor tracing scheme, which is as secure as NTRU. This novel work contains some desirable features, such as full collusion-resistance, black-box tracing, high efficiency, anonymity, asymmetry and revocation.Propose a new asymmetric public-key traitor tracing scheme based on bilinear map. The underlying security assumption of the scheme is the difficulty of Bilinear Decision Diffie-Hellman(BDDH) problem on elliptic curves. The novel work is capable of identifying all the active traitors with black-box tracing algorithm and gains an advantage over previous schemes in efficiency and revocation.
Keywords/Search Tags:Copyright protection, Broadcast Encryption, Traitor tracing
PDF Full Text Request
Related items