Tracing traitors by guessing secrets. The q-ary case
Document typeConference report
Rights accessRestricted access - publisher's policy
In this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton , a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential traitor tracing schemes are used to detect piracy in multimedia content broadcast systems, where the traitors illegally rebroadcast the content they receive to unauthorized users.
CitationFernandez, M.; Soriano, M.; Cotrina, J. Tracing traitors by guessing secrets. The q-ary case. A: Information Security Practice and Experience Conference. "Information security practice and experience: First International Conference, ISPEC 2005: Singapore, April 11-14, 2005: proceedings". Singapore: Springer, 2005, p. 61-73.
|Tracing traitor ... ecrets. The q-ary case.pdf||Tracing traitors by guessing secrets. The q-ary case||192,0Kb||Restricted access|