Journal of Cryptology

, Volume 14, Issue 3, pp 211–223 | Cite as

Dynamic Traitor Tracing

  • Amos  Fiat
  • Tamir  Tassa


Traitor tracing schemes were introduced to combat the typical piracy scenario whereby pirate decoders (or access control smartcards) are manufactured and sold by pirates to illegal subscribers. Those traitor tracing schemes, however, are ineffective for the currently less common scenario where a pirate publishes the periodical access control keys on the Internet or, alternatively, simply rebroadcasts the content via an independent pirate network. This new piracy scenario may become especially attractive (to pirates) in the context of broadband multicast over the Internet. In this paper we consider the consequences of this type of piracy and offer countermeasures. We introduce the concept of dynamic traitor tracing which is a practical and efficient tool to combat this type of piracy.

Key words. Broadcast, Encryption, Traitor tracing, Watermarking, Imprinting, Pay TV, On-line algorithms. 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© International Association for Cryptologic Research 2001

Authors and Affiliations

  • Amos  Fiat
    • 1
  • Tamir  Tassa
    • 2
  1. 1.Department of Computer Science, School of Mathematical Sciences, Tel Aviv University, Tel Aviv, Israel and Algorithmic Research Ltd., 10 Nevatim Street, Petah Tikva, IsraelIL
  2. 2.Algorithmic Research Ltd., 10 Nevatim Street, Petah Tikva, IsraelIL

Personalised recommendations