[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1501434.1501508acmotherconferencesArticle/Chapter ViewAbstractPublication PagespstConference Proceedingsconference-collections
research-article

Privacy, traceability, and anonymity for content protection

Published: 30 October 2006 Publication History

Abstract

In this paper we are concerned with the privacy, traceability and anonymity for content distribution and protection applications. We believe for many content protection applications, privacy friendly anonymous trust is needed. We argue broadcast encryption technologies have advantages over public key encryption systems in these applications. When coming to combat piracy, we provided some business scenarios where it is essential to offer traceability in order to protect the revenues drawn from the provided services. However, in some scenarios, privacy concern needs to be carefully addressed in order to have a viable business. We shed insights on different technologies that can be used to offer solutions in each category.

References

[1]
www.aacsla.org
[2]
A. Fiat and M. Naor, "Broadcast Encryption," Crypto'93, Lecture Notes in computer science, Vol. 773, pp480--491. Springer-Verlag, Berlin, Heidelberg, New York, 1993.
[3]
http://4centity.com
[4]
D. Naor, M. Naor and J. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers", Crypto 2001, Lecture Notes in computer science, Vol. 2139, pp 41--62, 2001.
[5]
B. Chor, A, Fiat and M. Naor, "Tracing traitors," Crypto'94, Lecture Notes in computer science, Vol. 839, pp480--491. Springer-Verlag, Berlin, Heidelberg, New York, 1994.
[6]
A. Fiat and T. Tassa, "Dynamic traitor tracing," Crypto'99, Lecture Notes in computer science, Vol. 1666, pp354--371. Springer-Verlag, Berlin, Heidelberg, New York, 1999.
[7]
R. Safani-Naini and Y. Wang, "Sequential Traitor tracing," IEEE Transactions on Information Theory, 49, 2003.
[8]
J. Lotspiech, S. Nusser and F. Pestoni, "anonymous trust: Digital Rights Management using Broadcast Encryption", IEEE proceedings, 2003.
[9]
H. Jin, J. Lotspiech and S. Nusser, "Traitor tracing for prerecorded and recordable media", ACM DRM workshop, Oct. 2004.

Cited By

View all
  • (2011)Traitor Tracing and Revocation Mechanisms with Privacy-PreservingProceedings of the 2011 Seventh International Conference on Computational Intelligence and Security10.1109/CIS.2011.190(842-846)Online publication date: 3-Dec-2011

Index Terms

  1. Privacy, traceability, and anonymity for content protection

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      PST '06: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
      October 2006
      389 pages
      ISBN:1595936041
      DOI:10.1145/1501434
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 30 October 2006

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. anonymous trust
      2. content protection
      3. privacy
      4. security
      5. tracing

      Qualifiers

      • Research-article

      Conference

      PST06
      PST06: International Conference on Privacy, Security and Trust
      October 30 - November 1, 2006
      Ontario, Markham, Canada

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 25 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2011)Traitor Tracing and Revocation Mechanisms with Privacy-PreservingProceedings of the 2011 Seventh International Conference on Computational Intelligence and Security10.1109/CIS.2011.190(842-846)Online publication date: 3-Dec-2011

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media