Key evolution-based tamper resistance: A subgroup extension
Hongxia Jin, Ginger Myles, et al.
ASIACCS 2007
In this paper we study the traitor tracing problem in the context of content protection. Traitor tracing is a forensic technology that attempts to detect the users who have involved in the pirate attacks when pirate evidences are recovered. There are different types of pirate attacks and each requires a different traitor tracing mechanism. We studied different types of attacks, surveyed various traitor tracing schemes and analyzed spectrum of traceabilities of different schemes using two representative schemes. We shall present some observations on the designs and their impact on the efficiency of the schemes. We shall also present various future directions that can lead to simpler and more efficient traitor tracing schemes for various pirate attacks.
Hongxia Jin, Ginger Myles, et al.
ASIACCS 2007
Hongxia Jin
PST 2006
Hongxia Jin, Jeffery Lotspiech
ICME 2005
Hongxia Jin, Jeffory Lotspiech, et al.
SECRYPT 2006