Traitor tracing

Traitor tracing schemes help trace the source of leaks when secret or proprietary data is sold to many customers. In a traitor tracing scheme, each customer is given a different personal decryption key. (Traitor tracing schemes are often combined with conditional access systems so that, once the traitor tracing algorithm identifies a personal decryption key associated with the leak, the content distributor can revoke that personal decryption key, allowing honest customers to continue to watch pay television while the traitor and all the unauthorized users using the traitor's personal decryption key are cut off.)

Traitor tracing schemes are used in pay television to discourage pirate decryption – to discourage legitimate subscribers from giving away decryption keys.[1][2][3][4][5] Traitor tracing schemes are ineffective if the traitor rebroadcasts the entire (decrypted) original content. There are other kinds of schemes that discourages pirate rebroadcast – i.e., discourages legitimate subscribers from giving away decrypted original content. These other schemes use tamper-resistant digital watermarking to generate different versions of the original content. Traitor tracing key assignment schemes can be translated into such digital watermarking schemes.[6][7][8]

Traitor tracing is a copyright infringement detection system which works by tracing the source of leaked files rather than by direct copy protection. The method is that the distributor adds a unique salt to each copy given out. When a copy of it is leaked to the public, the distributor can check the value on it and trace it back to the "leak".

  1. ^ Benny Chor, Amos Fiat, Moni Naor, Benny Pinkas. "Tracing Traitors". 1994.
  2. ^ Benny Pinkas. "Traitor Tracing". doi:10.1007/978-1-4419-5906-5_158. 2011.
  3. ^ Ryo Nishimaki; Daniel Wichs; Mark Zhandry. "Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key" Archived 2016-10-12 at the Wayback Machine. p. 1.
  4. ^ Dan Boneh; Mark Zhandry. "Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation". 2013. p. 5.
  5. ^ Michel Abdalla; Alexander W. Dent; John Malone-Lee; Gregory Neven; Duong Hieu Phan; and Nigel P. Smart. "Identity-Based Traitor Tracing". 2007.
  6. ^ Amos Fiat; Tamir Tassa. "Dynamic Traitor Tracing". doi:10.1007/s00145-001-0006-7. Journal of Cryptology. 2001. pp. 212–213.
  7. ^ Tamir Tassa. "Low Bandwidth Dynamic Traitor Tracing Schemes". Journal of Cryptology. 2005. pp. 167-183.
  8. ^ Xingwen Zhao, Fangguo Zhang. "Traitor Tracing against Public Collaboration". 2011. p. 2.