Traitor Tracing Schemes: a Review

  • Antonius Cahya Prihandoko

Abstract

This paper provides a review on traitor tracing schemes that are developed to counter piracy strategies. The review starts with a formal definition of the traitor tracing schemes. The paper is then outlined based on two main strategies which may taken by digital content pirates. Mostly the pirates have strategy to make use leaked decryption key or leaked decrypted content. For each piracy strategy, we presents traitor tracing schemes that can be used to counter the piracy. We also analysis strength and weakness of each group of the schemes. At the end of this paper, we propose to combine some schemes for better protection. 
 

Published
2018-08-31
How to Cite
PRIHANDOKO, Antonius Cahya. Traitor Tracing Schemes: a Review. INFORMAL: Informatics Journal, [S.l.], v. 3, n. 2, p. 41-47, aug. 2018. ISSN 2503-250X. Available at: <https://jurnal.unej.ac.id/index.php/INFORMAL/article/view/9988>. Date accessed: 21 nov. 2024. doi: https://doi.org/10.19184/isj.v3i2.9988.