Efficient Traitor Tracing

In this paper we study the traitor tracing problem, which originates in combating piracy of copyrighted materials. When a pirated copy of some copyrighted material is observed, a traitor tracing scheme should identify at least one of the real users (traitors) who participate in the construction of the pirated copy. Content is divided into multiple segments and each segment comes with multiple variations. Each user can only play back one variation through the content. Given some practical restrictions on the number of variations one can put into the content and the number of users to accommodate, we will show an efficient tracing scheme that can achieve superlinear traceability in terms of the number of recovered pirate copies of the content needed as a function of the number of traitors involved in a coalition. The efficiency of the tracing scheme is one of the enabling factors for the first commercial use of a traitor tracing technology within the AACS 1 (Advanced Access Content System) content protection standards for next generation high-definition video optical disc.

By: Hongxia Jin; jeffery lotspiech; Nimrod Megiddo

Published in: RJ10390 in 2006

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

rj10390.pdf

Questions about this service can be mailed to reports@us.ibm.com .