A survey on Traitor Tracing Schemes

dc.contributor.authorChen, Jasonen
dc.date.accessioned2006-08-22T14:24:36Z
dc.date.available2006-08-22T14:24:36Z
dc.date.issued2000en
dc.date.submitted2000en
dc.description.abstractWhen intellectual properties are distributed over a broadcast network, the content is usually encrypted in a way such that only authorized users who have a certain set of keys, can decrypt the content. Some authorized users may be willing to disclose their keys in constructing a pirate decoder which allows illegitimate users to access the content. It is desirable to determine the source of the keys in a pirate decoder, once one is captured. Traitor tracing schemes were introduced to help solve this problem. A traitor tracing scheme usually consists of: a scheme to generate and distribute each user's personal key, a cryptosystem used to protect session keys that are used to encrypt/decrypt the actual content, and a tracing algorithm to determine one source of the keys in a pirate decoder. In this thesis, we survey the traitor tracing schemes that have been suggested. We group the schemes into two groups: <i>symmetric</i> in which the session key is encrypted and decrypted using the same key and <i>asymmetric</i> schemes in which the session key is encrypted and decrypted using different keys. We also explore the possibility of a truly public scheme in which the data supplier knows the encryption keys only. A uniform analysisis presented on the efficiency of these schemes using a set of performance parameters.en
dc.formatapplication/pdfen
dc.format.extent635341 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.urihttp://hdl.handle.net/10012/1108
dc.language.isoenen
dc.pendingfalseen
dc.publisherUniversity of Waterlooen
dc.rightsCopyright: 2000, Chen, Jason. All rights reserved.en
dc.subjectMathematicsen
dc.subjectcrytographyen
dc.subjectencryptionen
dc.subjectbroadcastingen
dc.subjecttracingen
dc.titleA survey on Traitor Tracing Schemesen
dc.typeMaster Thesisen
uws-etd.degreeMaster of Mathematicsen
uws-etd.degree.departmentCombinatorics and Optimizationen
uws.peerReviewStatusUnrevieweden
uws.scholarLevelGraduateen
uws.typeOfResourceTexten

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
jqchen2000.pdf
Size:
620.45 KB
Format:
Adobe Portable Document Format