2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) 2013
DOI: 10.1109/comnetsat.2013.6870869
|View full text |Cite
|
Sign up to set email alerts
|

Deterring traitor using double encryption scheme

Abstract: Traitor is a legitimate user in a content distribution system who facilitates illegal content access to unauthorized party. Naturally, there are two strategies that are likely used by the traitors to do violations. Firstly, the traitors may attempt to extract the decryption keys to construct a pirate decoder. Secondly, they may legally decrypt the content and then illegally redistribute the decrypted content for their own benefits. We propose a content protection scheme to deter both piracy strategies. However… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…In this method, information is encrypted before being distributed over an insecure networks. With this capability, cryptography has a widely range of applications: securing content distribution systems [2], improving digital rights management systems [3]- [4], establishing speech encryption [5]- [6], tracing traitor in a content distribution system [7], solving security problem in mobile computing [8]- [9], and many more. The strength of cryptography protocols relies on the encryption-decryption keys management: how to protect the keys from disclose to unauthorized parties.…”
Section: Introductionmentioning
confidence: 99%
“…In this method, information is encrypted before being distributed over an insecure networks. With this capability, cryptography has a widely range of applications: securing content distribution systems [2], improving digital rights management systems [3]- [4], establishing speech encryption [5]- [6], tracing traitor in a content distribution system [7], solving security problem in mobile computing [8]- [9], and many more. The strength of cryptography protocols relies on the encryption-decryption keys management: how to protect the keys from disclose to unauthorized parties.…”
Section: Introductionmentioning
confidence: 99%
“…Legal decryption keys are given only to authorized users. Some encryption protocols for information security purposes have been proposed in many literatures [6,7,8]. The strength of these protocols relays on the encryption-decryption keys management.…”
Section: Introductionmentioning
confidence: 99%
“…These methods ultimately aim to keep the decryption key secret, so that only authorized users can access protected content. In addition, traitor tracing schemes [6,7] have also been implemented to trace nasty users that redistribute the content illegally.…”
Section: Introductionmentioning
confidence: 99%