A survey on Traitor Tracing Schemes
dc.contributor.author | Chen, Jason | en |
dc.date.accessioned | 2006-08-22T14:24:36Z | |
dc.date.available | 2006-08-22T14:24:36Z | |
dc.date.issued | 2000 | en |
dc.date.submitted | 2000 | en |
dc.description.abstract | When intellectual properties are distributed over a broadcast network, the content is usually encrypted in a way such that only authorized users who have a certain set of keys, can decrypt the content. Some authorized users may be willing to disclose their keys in constructing a pirate decoder which allows illegitimate users to access the content. It is desirable to determine the source of the keys in a pirate decoder, once one is captured. Traitor tracing schemes were introduced to help solve this problem. A traitor tracing scheme usually consists of: a scheme to generate and distribute each user's personal key, a cryptosystem used to protect session keys that are used to encrypt/decrypt the actual content, and a tracing algorithm to determine one source of the keys in a pirate decoder. In this thesis, we survey the traitor tracing schemes that have been suggested. We group the schemes into two groups: <i>symmetric</i> in which the session key is encrypted and decrypted using the same key and <i>asymmetric</i> schemes in which the session key is encrypted and decrypted using different keys. We also explore the possibility of a truly public scheme in which the data supplier knows the encryption keys only. A uniform analysisis presented on the efficiency of these schemes using a set of performance parameters. | en |
dc.format | application/pdf | en |
dc.format.extent | 635341 bytes | |
dc.format.mimetype | application/pdf | |
dc.identifier.uri | http://hdl.handle.net/10012/1108 | |
dc.language.iso | en | en |
dc.pending | false | en |
dc.publisher | University of Waterloo | en |
dc.rights | Copyright: 2000, Chen, Jason. All rights reserved. | en |
dc.subject | Mathematics | en |
dc.subject | crytography | en |
dc.subject | encryption | en |
dc.subject | broadcasting | en |
dc.subject | tracing | en |
dc.title | A survey on Traitor Tracing Schemes | en |
dc.type | Master Thesis | en |
uws-etd.degree | Master of Mathematics | en |
uws-etd.degree.department | Combinatorics and Optimization | en |
uws.peerReviewStatus | Unreviewed | en |
uws.scholarLevel | Graduate | en |
uws.typeOfResource | Text | en |
Files
Original bundle
1 - 1 of 1