Traitor Tracing for Anonymous Attack in AACS Content Protection

Hongxia Jin, IBM Almaden

Abstract: Broadcast encryption and traitor tracing are two active problems in cryptography community. In this talk I will give an overview on how broadcast encryption and traitor tracing can be used for content protection. My focus of the talk is on tracing traitors for anonymous attack. It is a way to trace the source of unauthorized copies of the content or content encrypting keys when the system is broadcasted. I will give the talk in the context of AACS, the new industry content protection standards for next generation high definition DVDs, It is the first large-scale commercial deployment of a traitor tracing technology. Along the way we have had to solve both practical and theoretical problems that had not been apparent in the literature to date. In this talk I will focus on addressing some of those problems in our process of bringing a theoretical solution to practice.

Time and Place

3 Jun 2008 (Tuesday) at 1630 hrs
Gates 4B (opposite 490)